𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security in Vehicular Networks: Focus on Location and Identity Privacy

✍ Scribed by Leila Benarous, Salim Batim, Abdelhamid Mellouk


Publisher
Wiley-ISTE
Year
2022
Tongue
English
Leaves
265
Series
Networks & Telecommunications Series: New Generation Networks Set, 1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road.

This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

This book also presents a new privacy-aware blockchain-based pseudonym management framework.

✦ Table of Contents


Cover
Title Page
Copyright Page
Contents
Preface
List of Acronyms
Introduction
Chapter 1. Vehicular Networks
1.1. Introduction
1.2. Motivation by numbers
1.3. Evolution
1.4. Architecture
1.5. Characteristics
1.6. Technical challenges and issues
1.7. Wireless technology
1.8. Standards
1.8.1. IEEE WAVE stack
1.8.2. ETSI standards
1.8.3. The 3GPP standard
1.9. Types
1.9.1. The autonomous vehicle (self-dependent)
1.9.2. VANET
1.9.3. Vehicular clouds
1.9.4. Internet of vehicles
1.9.5. Social Internet of vehicles
1.9.6. Data named vehicular networks
1.9.7. Software-defined vehicular networks
1.10. Test beds and real implementations
1.11. Services and applications
1.12. Public opinion
1.13. Conclusion
Chapter 2. Privacy and Security in Vehicular Networks
2.1. Introduction
2.2. Privacy issue in vehicular networks
2.2.1. Types
2.2.2. When and how it is threatened?
2.2.3. Who is the threat?
2.2.4. What are the consequences?
2.2.5. How can we protect against it?
2.3. State-of-the-art location privacy-preserving solutions
2.3.1. Non-cooperative change
2.3.2. Silence approaches
2.3.3. Infrastructure-based mix-zone approach
2.3.4. The cooperation approach (distributed mix-zone)
2.3.5. Hybrid approach
2.4. Authentication issues in vehicular networks
2.4.1. What is being authenticated in vehicular networks?
2.4.2. Authentication types
2.4.3. How does authentication risk privacy?
2.5. Identity privacy preservation authentication solutions: state of the art
2.6. Conclusion
Chapter 3. Security and Privacy Evaluation Methodology
3.1. Introduction
3.2. Evaluation methodology
3.2.1. Security
3.2.2. Privacy
3.3. Conclusion
Chapter 4. The Attacker Model
4.1. Introduction
4.2. Security objectives
4.3. Security challenges
4.4. Security attacker
4.4.1. Aims
4.4.2. Types
4.4.3. Means
4.4.4. Attacks
4.4.5. Our attacker model
4.5. Conclusion
Chapter 5. Privacy-preserving Authentication in Cloud-enabled Vehicle Data Named Networks (CVDNN) for Resources Sharing
5.1. Introduction
5.2. Background
5.2.1. Vehicular clouds
5.2.2. Vehicular data named networks
5.3. System description
5.4. Forming cloud-enabled vehicle data named networks
5.5. Migrating the local cloud virtual machine to the central cloud
5.6. Privacy and authentication when using/providing CVDNN services
5.6.1. The authentication process
5.6.2. The reputation testimony
5.7. The privacy in CVDNN
5.8. Discussion and analysis
5.8.1. The privacy when joining the VC
5.8.2. Privacy while using the VC
5.9. Conclusion
Chapter 6. Privacy-preserving Authentication Scheme for On-road On-demand Refilling of Pseudonym in VANET
6.1. Introduction
6.2. Network model and system functionality
6.2.1. Network model
6.2.2. The system functionality
6.3. Proposed scheme
6.4. Analysis and discussion
6.4.1. Security analysis
6.4.2. Burrows, Abadi and Needham (BAN) logic
6.4.3. SPAN and AVISPA tools
6.5. Conclusion
Chapter 7. Preserving the Location Privacy of Vehicular Ad hoc Network Users
7.1. Introduction
7.2. Adversary model
7.3. Proposed camouflage-based location privacy-preserving scheme
7.3.1. Analytical model
7.3.2. Simulation
7.4. Proposed hybrid pseudonym change strategy
7.4.1. Hypothesis and assumptions
7.4.2. Changing the pseudonyms
7.4.3. The simulation
7.5. Conclusion
Chapter 8. Preserving the Location Privacy of Internet of Vehicles Users
8.1. Introduction
8.2. CE-IoV
8.3. Privacy challenges
8.4. Attacker model
8.5. CLPPS: cooperative-based location privacy-preserving scheme for Internet of vehicles
8.5.1. Simulation
8.5.2. Comparative study and performance analysis
8.6. CSLPPS: concerted silence-based location privacy-preserving scheme for Internet of vehicles
8.6.1. The proposed solution
8.6.2. Simulation results
8.6.3. Comparative study performance analysis
8.7. Obfuscation-based location privacy-preserving scheme in cloud-enabled Internet of vehicles
8.7.1. The proposition
8.7.2. Study of feasibility using game theoretic approach
8.7.3. The simulation
8.7.4. Analytical model
8.7.5. Comparative study
8.8. Conclusion
Chapter 9. Blockchain-based Privacy-aware Pseudonym Management Framework for Vehicular Networks
9.1. Introduction
9.2. Background
9.2.1. Public key infrastructure (PKI)
9.2.2. Vehicular PKI
9.2.3. Blockchain technology
9.2.4. Blockchain of blockchains
9.3. Related works
9.3.1. Blockchain-based PKI
9.3.2. Privacy-aware blockchain-based PKI
9.3.3. Monero
9.3.4. Blockchain-based vehicular PKI
9.4. Key concepts
9.4.1. Ring signature
9.4.2. One-time address
9.5. Proposed solution
9.5.1. General description
9.5.2. Registration to the blockchain
9.5.3. Certifying process
9.5.4. Revocation process
9.5.5. Transaction structure and validation
9.5.6. Block structure and validation
9.5.7. Authentication using blockchain
9.6. Analysis
9.7. Comparative study
9.8. Conclusion
Conclusion
References
Index
EULA


πŸ“œ SIMILAR VOLUMES


Vehicular Ad Hoc Network Security and Pr
✍ Xiaodong Lin, Rongxing Lu πŸ“‚ Library πŸ“… 2015 πŸ› Wiley-IEEE Press 🌐 English

<b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b> <ul> <li>Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues</li> <li>Explores interdisciplinary methods

Security Assessment in Vehicular Network
✍ Suguo Du, Haojin Zhu (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based method

Network-on-Chip Security and Privacy
✍ Prabhat Mishra; Subodha Charles πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing securi

Security and privacy in communication ne
✍ Sushil Jajodia, Jianying Zhou πŸ“‚ Library πŸ“… 2010 πŸ› Springer 🌐 English

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email

Security and privacy in social networks
✍ Yuval Elovici, Yaniv Altshuler (auth.), Yaniv Altshuler, Yuval Elovici, Armin B. πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of