70 likes | 186 Views
Work on VANETS. Contributors: Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo Ferrer Talk leader: Qianhong Wu. CRISES Research Group, DEIM Universitat Rovira I Virgili qianhong.wu@urv.cat. Papers published & accepted.
E N D
Work on VANETS Contributors: Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo Ferrer Talk leader: Qianhong Wu CRISES Research Group, DEIM Universitat Rovira I Virgili qianhong.wu@urv.cat
Papers published & accepted • Josep Domingo-Ferrer, Qianhong Wu. “Safety and Privacy in Vehicular Communications. Privacy in Location-Based Applications.” Lecture Notes in Computer Science, vol.5599, pp. 173-189. Springer Berlin / Heidelberg, 15 Jul 2009. (Extended version of the PiLBA 08 invited talk) • Qianhong Wu, Josep Domingo-Ferrer and Úrsula González-Nicolás. “Balanced Trustworthiness, Safety and Privacy in Vehicle-to-Vehicle Communications.” IEEE Transactions on Vehicular Technology. Vol.59 (2): 559 - 573, 2010. • Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer. “A Scalable Robust Authentication Protocol For Secure Vehicular Communications.” IEEE Transactions on Vehicular Technology. (Accepted, Nov. 19, 2009) • Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang. “Conciliating Liability and Privacy in Large-Scale VANETs.” IEEE Transactions on Systems, Man, and Cybernetics. (Accepted, 08-Jan-2010)
Papers in progress • Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer. “Security, Privacy and Aggregation in Vehicular Communications.” In submission. • Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer. “Robust Privacy-Preserving Location Based Services in Vehicular Ad Hoc Networks”. In preparation. • …
Safety and Privacy in Vehicular Communications (Extended abstract) • VANET Potential Applications • Traffic safety related applications, Traffic optimization, Value-added services in VANETs • Characteristics of VANETs: • Security Requirement: • Threshold authentication; Anonymity; Revocability • Existing Countermeasures for Securing VANETs: • Posteriori or Priori Countermeasures • Combination Countermeasure: • Message-Linkable Group Signatures
Balanced Trustworthiness, Safety, and Privacy inV2V Communications • Threshold V2V Authentication Protocol • Distinguished features • Posteriori and Priori Countermeasures • Adaptively adjustable threshold • New crypto tech • Message-Linkable Group Signature • Speedup message verification in VANETs • Batch-Message Processing • Simulations
A Scalable Robust Authentication Protocol For Secure Vehicular Communications • Contribution: • Relief from heavy complicated distribution and revocation • Avoidance of computation and communication bottlenecks • Reduction of the strong reliance on tamper-proof devices • Main idea: • Each RSU maintains an on-the-fly group within its communication range • Vehicles anonymously generate V2V messages • Vehicles verify anonymous V2V messages from other vehicles. • Crypto techniques: • Signcryption • Group signature
Conciliating Liability and Privacy in Large-Scale VANETs. • Contribution: • Elimination of certificate management • Robust system setup • Emergency message generation • Fast message verification • Main ideas: • Hierarchical organization of VANET • Subgroup partition • Identity based authentication • Selfish verification mechanism • Crypto techniques: • Identity-based group signatures (IBGS) • Threshold secret sharing techniques • Online/Offline signature)