| Literature DB >> 29966390 |
Youngho Park1, Chul Sur2, Si-Wan Noh3, Kyung-Hyune Rhee4.
Abstract
In vehicular ad hoc networks, trajectory-based message delivery is a message forwarding strategy that utilizes the vehicle’s preferred driving routes information to deliver messages to the moving vehicles with the help of roadside units. For the purpose of supporting trajectory-based message delivery to a moving vehicle, the driving locations of the vehicle need to be shared with message senders. However, from a security perspective, vehicle users do not want their driving locations to be exposed to others except their desired senders for location privacy preservation. Therefore, in this paper, we propose a secure location-sharing system to allow a vehicle user (or driver) to share his/her driving trajectory information with roadside units authorized by the user. To design the proposed system, we put a central service manager which maintains vehicle trajectory data and acts as a broker between vehicles and roadside units to share the trajectory data on the cloud. Nevertheless, we make the trajectory data be hidden from not only unauthorized entities but also the service manager by taking advantage of a proxy re-encryption scheme. Hence, a vehicle can control that only the roadside units designated by the vehicle can access the trajectory data of the vehicle.Entities:
Keywords: VANETs; authentication; location sharing; privacy preservation; trajectory-based message delivery
Year: 2018 PMID: 29966390 PMCID: PMC6068972 DOI: 10.3390/s18072112
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Service scenario of trajectory-based message delivery.
Figure 2System Architecture.
Notations and descriptions.
| Notation | Description |
|---|---|
| bilinear map groups of a prime order | |
|
| bilinear map |
|
| generators of |
|
| master secret key of TA |
|
| public key of TA corresponding to |
|
| identity of a roadside unit |
|
| identity of a socialspot RSU |
|
| id-based secret key for an |
|
| |
|
| id-based private key of a vehicle |
| private and public key of | |
|
| re-encryption key of |
|
| current timestamp |
|
| symmetric encryption under the key |
|
| symmetric decryption under the key |
|
| message authentication code under the key |
Figure 3Message forwarding from an RSU to a destination vehicle.
Figure 4Road configuration for simulation.
NS-2 simulation parameters.
| Simulation Setting | |
|---|---|
| road dimension | 4600 m × 3800 m |
| # of vehicles | {30, 45, 60, 75, 90, 105, 120, 135, 150} |
| # of contact point RSUs | 5 |
| # of destination vehicles | 15 |
| moving speed | {40, 50, 60, 70} km/h |
| mobility model | Manhattan model |
| wireless/bandwidth | 802.11 p/6 Mbps |
| radio coverage | 250 m |
| message size | 100 KB |
| message lifetime | 500 s |
| simulation time | 2000 s |
Figure 5Average number of hops for forwarding messages to the destination vehicles.
Figure 6Average forwarding delay () to the number of hops burdened by authentication process.
Figure 7Average message delivery delay (D) from contact point RSUs to the destination vehicles.
Figure 8Successful message delivery ratio for the destination vehicles.