2009
DOI: 10.1007/s11036-009-0175-4
|View full text |Cite
|
Sign up to set email alerts
|

REP: Location Privacy for VANETs Using Random Encryption Periods

Abstract: It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which is concerned with preventing an attacker from tracking a specific vehicle. In this paper, we propose a novel location privacy preservation scheme for VANETs using random encryption periods (REP). REP is based on a privacy preserving group communication protocol, which has a conditional full statelessness property. In addition, REP en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(57 citation statements)
references
References 16 publications
0
57
0
Order By: Relevance
“…They introduce complementary security mechanisms that can meet the security requirements of location privacy. The proposed privacy scheme is based on random encryption period (REP) [81]. This approach relies on a security threshold scheme and a probabilistic key distribution.…”
Section: B Privacy-preserving Authentication Schemes That Address Lomentioning
confidence: 99%
See 1 more Smart Citation
“…They introduce complementary security mechanisms that can meet the security requirements of location privacy. The proposed privacy scheme is based on random encryption period (REP) [81]. This approach relies on a security threshold scheme and a probabilistic key distribution.…”
Section: B Privacy-preserving Authentication Schemes That Address Lomentioning
confidence: 99%
“…The authentication schemes [79], [87], [81] that provide location privacy pay more attention to optimising the communication cost. These schemes focus on the authentication of messages in a timely manner.…”
Section: B Cryptographic Approachesmentioning
confidence: 99%
“…Instead of restricting the CMIX zone at the road intersection, Ying et al (2013) proposed dynamic mix-zone For location privacy in vehicular networks (DMLP) to dynamically create a CMIX zone i.e., the vehicle establishes a CMIX zone where and when it is needed. Similarly, Wasef and Shen (2010) suggested random encryption periods (REPs). When the vehicle decides to change its pseudonym, it sends a request to its neighbours for starting a REP. During a REP, the safety messages are encrypted using a shared group key.…”
Section: Pseudonym Changing Strategiesmentioning
confidence: 99%
“…Hence, devising security, privacy and anonymity protection mechanisms for P2P systems poses challenges for researchers and software engineers. According to Balfe et al [Balfe et al, 2004] and Wasef and Shen [Wasef and Shen, 2009], the main challenge in creating P2P systems stems from the perceived need of providing anonymity for users of the system and the growing need of offering robust access control, confidentiality and data integrity. Illegitimate attacks in which malevolent parties may assume multiple identities undermine the efficiency of P2P systems, and characterize a fundamental security threat [Piscitello, 2002].…”
Section: In3 Working Paper Series In3 (Uoc)mentioning
confidence: 99%