1st International ICST Workshop on Vehicle Communications and Applications

Research Article

You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344746,
        author={Kewei  Sha and Yong  Xi and Weisong Shi and Loren  Schwiebert and Tao Zhang},
        title={You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks},
        proceedings={1st International ICST Workshop on Vehicle Communications and Applications},
        publisher={IEEE},
        proceedings_a={VEHICLECOMM},
        year={2007},
        month={4},
        keywords={},
        doi={10.1109/CHINACOM.2006.344746}
    }
    
  • Kewei Sha
    Yong Xi
    Weisong Shi
    Loren Schwiebert
    Tao Zhang
    Year: 2007
    You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks
    VEHICLECOMM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344746
Kewei Sha1, Yong Xi1, Weisong Shi1, Loren Schwiebert1, Tao Zhang2
  • 1: Department of Computer Science, Wayne State University
  • 2: Telcordia Technologies, Inc.

Abstract

Vehicular networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols. Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the degrees of privacy they wish to have. To address this requirement, we propose an adaptive privacy-preserving authentication mechanism that can trade off the privacy degree with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive privacy-preserving authentication. We present analytical and preliminary simulation results to show that the proposed protocol is not only adaptive but also scalable.