SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET

Abstract

Electric vehicle has attracted more and more attention all around the world in recent years because of its many advantages such as low pollution to the environment. However, due to the limitation of current technology, charging remains an important issue. In this paper, we study the problem of finding and making reservation on charging stations via a vehicular ad hoc network (VANET). Our focus is on the privacy concern as drivers would not like to be traced by knowing which charging stations they have visited. Technically, we make use of the property of blind signature to achieve this goal. In brief, an electric vehicle first generates a set of anonymous credentials on its own. A trusted authority then blindly signs on them after verifying the identity of the vehicle. After that, the vehicle can make charging station searching queries and reservations by presenting those signed anonymous credentials. We implemented the scheme and show that the credential signing process (expected to be the most time consuming step) can be completed within reasonable time when the parameters are properly set. In particular, the process can be completed in 5 minutes when 1024 bits of RSA signing key is used. Moreover, we show that our scheme is secure in terms of authentication and privacy-preserving.

Share and Cite:

T. Chim, J. Cheung, S. Yiu, L. Hui and V. Li, "SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET," Journal of Information Security, Vol. 3 No. 1, 2012, pp. 59-67. doi: 10.4236/jis.2012.31007.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] F. Wang, D. Zeng and L. Yang, “Smart Cars on Smart Roads: An IEEE Intelligent Transportation Systems Society Update,” IEEE Pervasive Computing, Vol. 5, No. 4, 2006, pp. 68-69. doi:10.1109/MPRV.2006.84
[2] H. Oh, C. Yae, D. Ahn and H. Cho, “5.8 GHz DSRC Packet Communication System for ITS Services,” Proceedings of the IEEE VTC’99, Amsterdam, 19-29 September 1999, pp. 2223-2227.
[3] D. Chaum, “Blind Signatures for Untraceable Payments, Advances in Cryptology,” Proceedings of the Springer-Verlag Crypto’82, Vol. 3, 1983, pp. 199-203.
[4] R. Lu, X. Lin, H. Zhu and X. Shen, “SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots,” Proceedings of the IEEE INFOCOM’09, Rio de Janeiro, 19-25 April 2009, pp. 1413-1421.
[5] T. W. Chim, S. M. Yiu, L. C. K. Hui and V. O. K. Li, “OPQ: OT-Based Private Querying in VANETs,” Transactions on Intelligent Transportation Systems, Vol. 12, No. 4, 2011, pp. 1413-1422. doi:10.1109/TITS.2011.2158208
[6] F. Calabrese, M. Colonna, P. Lovisolo, D. Parata and C. Ratti, “Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome,” IEEE Transactions on Intelligent Transportation Systems, Vol. 12, No. 1, 2011, pp. 141-151. doi:10.1109/TITS.2010.2074196
[7] C. Zhang, R. Lu, X. Lin, P. H. Ho and X. Shen, “An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks,” Proceedings of the IEEE INFOCOM’08, Phoenix, 13-18 April 2008, pp. 816-824.
[8] C. Zhang, X. Lin, R. Lu and P. H. Ho, “RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks,” Proceedings of the IEEE ICC’08, Beijing, 19-23 May 2008, pp. 1451-1457.
[9] A. Wasef and X. Shen, “PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks,” Proceedings of the IEEE ICC’08, Beijing, 19-23 May 2008, pp. 1458-1463.
[10] T. W. Chim, S. M. Yiu, L. C. K. Hui and V. O. K. Li, “SPECS: Secure and Privacy Enhancing Communications for VANET,” Ad Hoc Networks, Vol. 9, No. 2, 2011, pp. 189-203-175.
[11] B. K. Chaurasia, S. Verma and S. M. Bhasker, “Message Broadcast in VANETs Using Group Signature,” Proceedings of the IEEE WCSN’09, Allahabad, 27-29 December 2008, pp. 131-136.
[12] A. Studer, E. Shi, F. Bai and A. Perrig, “TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs,” Proceedings of the IEEE SECON’09, Rome, 22-26 June 2009, pp. 1-9.
[13] L. Chan, S. L. Ng and G. Wang, “Threshold Anonymous Announcement in VANETs,” IEEE Journal on Selected Areas in Communications, Vol. 29, No. 3, 2011, pp. 605-615. doi:10.1109/JSAC.2011.110310
[14] D. Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Communications of the ACM, Vol. 28, No. 70, 1985, pp. 1030-1044. doi:10.1145/4372.4373
[15] E. Aimeur, H. Hage and F. S. M. Onana, “Anonymous Credentials for Privacy-Preserving E-learning,” Proceedings of the IEEE MCETECH’08, Washington DC, 23-25 January 2008, pp. 70-80.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.