Auditable and privacy-preserving authentication in vehicular networks

Hoon Kim Sung, Han Kim Bum, Ki Kim Young, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Original languageEnglish
Title of host publicationProceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
Pages19-24
Number of pages6
DOIs
Publication statusPublished - 2008 Dec 1
Event2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 - Valencia, Spain
Duration: 2008 Sep 292008 Oct 4

Other

Other2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
CountrySpain
CityValencia
Period08/9/2908/10/4

    Fingerprint

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Cite this

Sung, H. K., Bum, H. K., Young, K. K., & Lee, D. H. (2008). Auditable and privacy-preserving authentication in vehicular networks. In Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 (pp. 19-24). [4641307] https://doi.org/10.1109/UBICOMM.2008.39