JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment
Nkenyereye, Lewis; Rhee, Kyung-Hyune;
  PDF(new window)
 Abstract
Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.
 Keywords
Vehicular Cloud Computing;Traffic Violation Reporting;Authentication;Conditional Privacy Preservation;
 Language
English
 Cited by
 References
1.
S.H. Ahmed, M.A. Yaqub, S.H. Bouk, and D. Kim, "Towards Content-centric Traffic Ticketing in VANETs: An Application Perspective," Proceeding of the Seventh IEEE International Conference on Ubiquitous and Future Networks, pp. 237-239, 2015.

2.
T.W. Chim, S.M. Yiu, L.C. Hui, and V.O. Li, "VSPN: VANET-based Secure and Privacypreserving Navigation," IEEE Transactions on Computers, Vol. 63, No. 2, pp. 510-524, 2014. crossref(new window)

3.
W. Cho, Y. Park, C. Sur, and K. Rhee, "An Improved Privacy-preserving Navigation Protocol in VANETS," Journal of Wireless Mobile Networks Ubiquitous Computer Dependable Applications, Vol. 4, No. 4, pp. 80-92, 2013.

4.
S. Olariu, T. Hristov, and G. Yan, The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds. Mobile ad Hoc Networking: Cutting Edge Directions, John Wiley & Sons, Inc., Hoboken, New Jersey, 2013.

5.
D. He, S. Zeadally, B. Xu, and X. Huang, "An Efficient Identity-Based Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics and Security, Vol. 10, No. 12, pp. 2681-2691, 2015. crossref(new window)

6.
R. Hussain, "Cooperation-aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks," Journal of Information Processing Systems, Vol. 10, No. 1, pp. 103-118, 2014. crossref(new window)

7.
L. Nkenyereye, B.A. Tama, Y. Park, and K. Rhee, "A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs," Journal of Wireless Mobile Networks Ubiquitous Computer Dependable Applications, Vol. 6, No. 2, pp. 98-112, 2015.

8.
R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "A Novel Anonymous Mutual Authentication Protocol with Provable Link-layer Location Privacy," IEEE Transactions on Vehicular Technology, Vol. 58, No. 3, pp. 1454-1466, 2009. crossref(new window)

9.
Y. S. Park, C.D.Jung, Y. Park, K.H. Rhee, "An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications," Journal of Korea Multimedia Society, Vol.13, No.6, pp.865-874, 2010.

10.
S. Mallissery, P.M.M. Manohara, N. Ajam, J. Mouzna, and P.M.J Mouzna, "Transport and Traffic Rule Violation Monitoring Service in ITS: A Secured VANET Cloud Application," Proceeding of the 12th Annual IEEE Conference on Consumer Communications and Networking, pp. 213-218, 2015.