551 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author오희국-
dc.date.accessioned2018-04-26T02:08:42Z-
dc.date.available2018-04-26T02:08:42Z-
dc.date.issued2016-10-
dc.identifier.citationIEEE ACCESS, v. 4, Page. 7770-7784en_US
dc.identifier.issn2169-3536-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/7676263/-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/70680-
dc.description.abstractVehicular ad hoc network (VANET) is a technology that enables smart vehicles to communicate with each other and form a mobile network. VANET facilitates users with improved traffic efficiency and safety. Authenticated communication becomes one of the prime requirements of VANET. However, authentication may reveal a user's personal information such as identity or location, and therefore, the privacy of an honest user must be protected. This paper proposes an efficient and practical pseudonymous authentication protocol with conditional privacy preservation. Our protocol proposes a hierarchy of pseudonyms based on the time period of their usage. We propose the idea of primary pseudonyms with relatively longer time periods that are used to communicate with semi-trusted authorities and secondary pseudonyms with a smaller life time that are used to communicate with other vehicles. Most of the current pseudonym-based approaches are based on certificate revocation list (CRL) that causes significant communication and storage overhead or group-based approaches that are computationally expensive and suffer from group-management issues. These schemes also suffer from trust issues related to certification authority. Our protocol only expects an honest-but-curious behavior from otherwise fully trusted authorities. Our proposed protocol protects a user's privacy until the user honestly follows the protocol. In case of a malicious activity, the true identity of the user is revealed to the appropriate authorities. Our protocol does not require maintaining a CRL and the inherent mechanism assures the receiver that the message and corresponding pseudonym are safe and authentic. We thoroughly examined our protocol to show its resilience against various attacks and provide computational as well as communicational overhead analysis to show its efficiency and robustness. Furthermore, we simulated our protocol in order to analyze the network performance and the results show the feasibility of our proposed protocol in terms of end-to-end delay and packet delivery ratio.en_US
dc.description.sponsorshipThis work was supported in part by the National Research Foundation of Korea by the Korean Government Ministry of Education, Science and Technology under Grant NRF-2015R1D1A1A09058200 and in part by the Ministry of Science, ICT and Future Planning, Korea, under the Information Technology Research Center supervised by the Institute for Information & communications Technology Promotion (IITP) under Grant IITP-2016-H8501-16-1018.en_US
dc.language.isoen_USen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.subjectVehicular adhoc networken_US
dc.subjectauthenticationen_US
dc.subjectprivacyen_US
dc.subjectpseudonymsen_US
dc.subjectVEHICULAR COMMUNICATIONSen_US
dc.subjectSECUREen_US
dc.titleA Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANETen_US
dc.typeArticleen_US
dc.relation.volume4-
dc.identifier.doi10.1109/ACCESS.2016.2620999-
dc.relation.page7770-7784-
dc.relation.journalIEEE ACCESS-
dc.contributor.googleauthorRajput, Ubaidullah-
dc.contributor.googleauthorAbbas, Fizza-
dc.contributor.googleauthorOh, Heekuck-
dc.relation.code2016042256-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidhkoh-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE