Show simple item record

dc.contributor.authorCaballero Gil, Cándido
dc.contributor.authorMolina Gil, Jezabel
dc.contributor.authorHernández Serrano, Juan
dc.contributor.authorLeón Abarca, Olga
dc.contributor.authorSoriano Ibáñez, Miguel
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2016-01-22T12:01:42Z
dc.date.available2018-01-02T01:30:59Z
dc.date.issued2016-01
dc.identifier.citationCaballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., Leon, O., Soriano, M. Providing k-anonymity and revocation in ubiquitous VANETs. "Ad hoc networks", Gener 2016, vol. 36, p. 482-494.
dc.identifier.issn1570-8705
dc.identifier.urihttp://hdl.handle.net/2117/81886
dc.description.abstractAbstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from the cloud, it also introduces some privacy risks by making it easier to track the physical location of vehicles. For this reason, to guarantee the proper performance of a \{VANET\} it is essential to protect the service against malicious users aiming at disrupting the proper operation of the network. Current researches usually define a traditional identity-based authentication for nodes, which are loaded with individual credentials. However, the use of these credentials in VANETs without any security mechanism enables vehicle tracking and therefore, violate users’ privacy, a risk that may be overcome by means of appropriate anonymity schemes. This comes at the cost, however, of on the one hand preventing VANET centralized authorities from identifying malicious users and revoking them from the network, or on the other hand to avoid complete anonymity of nodes in front of the CA thus to allow their revocation. In this paper, a novel revocation scheme that is able to track and revoke specific malicious users only after a number of complaints have been received while otherwise guaranteeing node’s k-anonymity is described. The proper performance of these mechanisms has been widely evaluated with NS-2 simulator and an analytical model validated with scripts. The results show that presented work is a promising approach in order to increase privacy protection while allowing revocation with little extra costs.
dc.format.extent13 p.
dc.language.isoeng
dc.publisherElsevier
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació
dc.subject.lcshVehicular ad hoc networks (Computer networks)
dc.subject.otherUbiquitous
dc.subject.otherVANET
dc.subject.otherRevocation
dc.subject.otherk-anonimity
dc.subject.otherPrivacy
dc.subject.otherSecurity
dc.titleProviding k-anonymity and revocation in ubiquitous VANETs
dc.typeArticle
dc.subject.lemacOrdinadors, Xarxes d'
dc.contributor.groupUniversitat Politècnica de Catalunya. ISG - Grup de Seguretat de la Informació
dc.identifier.doi10.1016/j.adhoc.2015.05.016
dc.relation.publisherversionhttp://www.sciencedirect.com/science/article/pii/S1570870515001213
dc.rights.accessOpen Access
local.identifier.drac16673723
dc.description.versionPostprint (author's final draft)
local.citation.authorCaballero-Gil, C.; Molina-Gil, J.; Hernández-Serrano, J.; Leon, O.; Soriano, M.
local.citation.publicationNameAd hoc networks
local.citation.volume36
local.citation.startingPage482
local.citation.endingPage494


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Spain
Except where otherwise noted, content on this work is licensed under a Creative Commons license : Attribution-NonCommercial-NoDerivs 3.0 Spain