SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography




           Restricted Usage of Anonymous Credentials in
                 VANET for Misbehavior Detection

                                              Ankit Singh
                                           Fraunhofer SIT,
                                         Darmstadt, Germany


                                                June 25, 2012



                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


     1   Introduction to Vehicular Ad-hoc Network (VANET)
            Overview of Basic Components in VANETs
     2   Problem Statement
           What is the privacy issue in VANET?
     3   IT Security and Privacy requirements in VANET
           Requirements
     4   Design and Implementation of ACS Protocols for VANET
           Assumptions made for Designing the ACS protocols
           Players Participating in different Protocols
           Proposed Protocols
           Implementation of the Proposed Protocols and Contributions
     5   Analysis, Conclusion and Future Work
           Analysis and Discussions
           Conclusion of the Thesis
                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


             Future work of the Thesis




     6   Bibliography




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            Overview of Basic Components in VANETs
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


What is VANET and Why we need VANET? I
                                                 Safe and Secure travel

                                                 Free flow of traffic




                                                 Infotainment services




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            Overview of Basic Components in VANETs
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Overview of Basic Components in VANETs I




                                      Basic Component of VANET


                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Problem Statement I




                         Vehicle A broadcasting message of traffic Jam


                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Problem Statement II




        Vehicle A broadcasting message signed using a classical certificate




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Problem Statement III




    Vehicle A broadcasting message signed using a pseudonymous
    certificate



                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            What is the privacy issue in VANET?
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Problem Statement IV




    Vehicle A broadcasting same message signed using multiple
    pseudonymous certificates



                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
                                                            Requirements
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Requirements I

         Security Requirements                                Privacy Requirements
         Authentication                                       Anonymity
         Accountability                                       Unlinkability
         Verification of Data Consistency                      Restricted Credential usage
         Availability                                         Perfect forward privacy
         Non-repudiation
         Credential revocation




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement    Assumptions made for Designing the ACS protocols
         IT Security and Privacy requirements in VANET      Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET        Proposed Protocols
                    Analysis, Conclusion and Future Work    Implementation of the Proposed Protocols and Contributions
                                             Bibliography


Assumptions I

            Strong trust on issuer party
            Tamper proof storage device.
            Negotiations on attributes etc. are done before beginning of
            the protocols.
            Secure channel.
            Broadcasting messages.




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement    Assumptions made for Designing the ACS protocols
         IT Security and Privacy requirements in VANET      Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET        Proposed Protocols
                    Analysis, Conclusion and Future Work    Implementation of the Proposed Protocols and Contributions
                                             Bibliography


Players participating in different protocols I




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement    Assumptions made for Designing the ACS protocols
         IT Security and Privacy requirements in VANET      Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET        Proposed Protocols
                    Analysis, Conclusion and Future Work    Implementation of the Proposed Protocols and Contributions
                                             Bibliography


Proposed Protocols I

    Two versions of protocols are proposed for the problem statements:

            Setup protocol (common to both versions)
            Version 1 without revocation
                    Issuance protocol V1:
                    - Strong privacy.
                    Signing protocol V1:
                    - Achieved restricted usage of credential.
                    Verifying protocol V1:
                    - Detects fraud at verifier vehicle side
                    - No revocation request.




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement    Assumptions made for Designing the ACS protocols
         IT Security and Privacy requirements in VANET      Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET        Proposed Protocols
                    Analysis, Conclusion and Future Work    Implementation of the Proposed Protocols and Contributions
                                             Bibliography


Proposed Protocols II
            Version 2 with revocation
                    Issuance protocol V2:
                    - Weak privacy.
                    - Adapted from V1.
                    - Generates tracing ID.
                    Signing protocol V2:
                    - Adapted from V1 and randomizes tracing ID.
                    Verifying protocol V2:
                    - Adapted from V1 and revocation request
                    Tracing and Revocation protocol:
                    - Tracing of the fraud vehicle
                    - Revocation of the credential.




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement    Assumptions made for Designing the ACS protocols
         IT Security and Privacy requirements in VANET      Players Participating in different Protocols
Design and Implementation of ACS Protocols for VANET        Proposed Protocols
                    Analysis, Conclusion and Future Work    Implementation of the Proposed Protocols and Contributions
                                             Bibliography


Implementation and Contributions I

            Designed Anonymous credential protocols for VANET
            Idemix java cryptographic library
    The Library was modified and extended:
            Support limited spending.
            Used domain pseudonyms for binding it to a time frame.
            Generating tracing ID.
            Generating multiple pseudonyms and saving it to a file.
            Randomizing tracing ID during signing protocol.
            Contributed in detecting the fraud at the receiver side.
            Modified library for preforming revocation.

                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
                                                                                                  Analysis and Discussions
         IT Security and Privacy requirements in VANET
                                                                                                  Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
                                                                                                  Future work of the Thesis
                    Analysis, Conclusion and Future Work
                                             Bibliography


Analysis and Discussions I

    Security requirements fulfilled ( : achieved; ◦: out of scope of this
    thesis)
                                                                       of
                                                        data consistency




                                                                                                                          Restricted cre-
                      Authentication




                                                                                                                                            Credential Re-
                                                                                                         Confidentiality
                                       Accountability




                                                                                                                          dential usage
                                                        Verification




                                                                                           repudiation
                                                                            Availability




                                                                                                                                            vocation
                                                                                           Non-



                                                              ◦               ◦


                                                                        Ankit Singh               Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
                                                                             Analysis and Discussions
         IT Security and Privacy requirements in VANET
                                                                             Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
                                                                             Future work of the Thesis
                    Analysis, Conclusion and Future Work
                                             Bibliography


Analysis and Discussions II

    Privacy requirements fulfilled ( : achieved; ◦: out of scope of this thesis)
                                 Minimum dis-




                                                                                                      for-
                                                                                           ward privacy
                                                            Unlinkability
                                                                            Distributed
                                                Anonymity




                                                                            Resolution
                                                                            Authority
                                                                                           Perfect
                                 closure




                                                                                ◦




                                                Ankit Singh                  Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
                                                            Analysis and Discussions
         IT Security and Privacy requirements in VANET
                                                            Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
                                                            Future work of the Thesis
                    Analysis, Conclusion and Future Work
                                             Bibliography


Conclusion I

            Successfully ‘achieved restricted usage of anonymous
            credentials in VANET’.
            Successfully ‘detected the fraud of overspending anonymous
            credentials by vehicles’.
            Successfully ‘achieved revocation of the defaulter vehicle’s
            anonymous credential’.
            Challenge in the usage of the proposed protocols in VANET
            due to:
                    Performance overhead of the protocols
                    Signed message size




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
                                                            Analysis and Discussions
         IT Security and Privacy requirements in VANET
                                                            Conclusion of the Thesis
Design and Implementation of ACS Protocols for VANET
                                                            Future work of the Thesis
                    Analysis, Conclusion and Future Work
                                             Bibliography


Future work I

            Signing and Verifying protocol must be optimized to reduce
            the execution time
            Revocation protocol performance and strategy must be
            optimized
            Credential update should be made compulsory for the vehicle
            (Specially for revocation)




                                             Ankit Singh    Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography I
           Handbook of Applied Cryptography, Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
           (http://cacr.uwaterloo.ca/hac/).

           SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER
           OBSOLETE, DAVID CHAUM, Communications of the ACM, October 1985, Volume 28, Number 10.

           Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank
           Kargl, Institute of Media Informatics, Ulm University, Germany.

           A signature scheme with efficient protocols. Jan Camenisch and Anna Lysyanskaya. In Stelvio Cimato,
           Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International
           Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer
           Verlag, 2003.

           An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Jan
           Camenisch1 , Anna Lysyanskaya2 ,1 IBM Research, Zurich Research Laboratory CH-8803, R¨schlikon,2 MIT
                                                                                                u
           LCS, 545 Technology Square, Cambridge, MA 02139 USA.

           Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Jan
           Camenisch and Anna Lysyanskaya. In Birgit Pfitzmann, editor, Advances in Cryptology — EUROCRYPT
           2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001.




                                             Ankit Singh      Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography II
           PRIME - Privacy and Identity Management for Europe. https://www.prime-project.eu/ Last Access:
           June 25, 2012.

           IBM software safeguards consumer identity on the Web, IDEMIX,
           http://www.zurich.ibm.com/news/07/idemix.html and official Idemix blog: http://idemix.wordpress.com/
           Last Access: June 25, 2012.

           Design and Implementation of the idemix Anonymous Credential System, Jan Camenisch and Els Van
           Herreweghen, IBM Research, Zurich Research Laboratory, Switzerland.

           Specification of the Identity Mixer Cryptographic Library, Version 2.3.3, IBM Research - Zurich, June 3,
           2011.
           Idemix Java library source download https://prime.inf.tu-dresden.de/idemix/ Last Access: June 25,
           2012.
           How to Explain Zero-Knowledge Protocols to Your Childern. QuisQuater Jean-Jacques(1) , Myriam, Muriel,
           Micha¨l GUILLOU Louis(2) , Marie Annick, Ga¨ Anna, Gwenol´, Soazig in collaboration with Tom
                 e                                      ıd,             e
           BERSON(3) for the English version. (1) Philips Research Laboratory, Avenue Van Becelaere, 2, B-1170
                              (2)
           Brussels, Belgium.     CCETT/EPT, BP 59, F-35512 Cesson S´vign´, France. (3) Anagram Laboratories,
                                                                        e     e
           P.O. Box 791, Palo Alto CA 94301, USA.




                                             Ankit Singh        Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography III
           Threshold Anonymous Announcement in VANETs, March 2011, Liqun Chen Member, IEEE Hewlett
           Packard Labs, Bristol, United Kingdom, Siaw-Lynn Ng, Department of Mathmatics, Royal Holloway,
           University of London, Egham, Surrey, United Kingdom and Guilin Wang, School of computer Science and
           Software Engineering, University of Wollongong, NSW, Australia.

           DAA: Fixing the pairing based protocols. L. Chen, P. Morrissey and N. P. Smart. Cryptology ePrint Archive:
           Report 2009/198, Withdrawn due to Major Flaw from http://eprint.iacr.org/2009/198 Last Access:
           June 25, 2012

           K-times anonymous authentication (extended abstract). I. Teranishi, J. Furukawa, and K. Sako. Internet
           Systems Research Laboratories, NEC Corporation 1753 Shimonumabe, Nakahara-Ku, Kawasaki 211-8666,
           Japan.

           Commitment schemes and zero-knowledge protocols, 2007, I. Damg˚rd and J. B. Nielsen.
                                                                         a

           A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION. Norbert
           Bißmeyer1 , Hagen St¨bing2 , Elmar Schoch3 , Stefan G¨tz4 , Jan Peter Stotz1 , Brigitte Lonc5 . 1 Fraunhofer
                                u                               o
           SIT, Secure Mobile Systems, 64295 Darmstadt, Germany. 2 Adam Opel AG, Active Safety, 65423
           R¨sselsheim, Germany,3 Volkswagen AG, Security and Connectivity, 38436 Wolfsburg, Germany,
             u
           4
             Continental Teves AG & Co. oHG, Connected Systems, 60488, Frankfurt/Main, Germany, 5 RENAULT
           S.A.S., Electronic Systems Engineering Department, 1 Avenue du Golf, 78288 Guyancourt Cedex, France.




                                              Ankit Singh        Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography IV
           Analysis of Revocation Strategies for Anonymous Idemix Credentials, Jorn Lapon1 , Markulf Kohlweiss3 ,
           Bart de Decker2 , and Vincent Naessens1 , 1 Katholieke Hogeschool Sint-Lieven, Industrial Engineering, 2
           Katholieke Universiteit Leuven, CS-DISTRINET, 3 Microsoft Research, Cambridge.

           Signature Schemes and Applications to Cryptographic Protocol Design. Anna Lysyanskaya. Ph.D. thesis,
           Massachusetts Institute of Technology, September 2002.

           Theft and Misuse Protection for Anonymous Credentials, Patrick Bichsel, Master Thesis MA-2007-42, June
           2007 to November 2007, ETH, Switzerland.

           Master Thesis KATHOLIEKE UNIVERSITEIT LEUVEN: Smart Card Implementation of Anonymous
           Credentials, Josep Balasch, 2007 - 2008, Promotor: Prof. Dr. Ir. Bart Preneel.

           Smart card integration in the pseudonym system idemix, Luuk Danes, Master Thesis 18 December 2007,
           University of Groningen, faculty of mathematics and natural sciences.

           How to Win the Clone Wars: Efficient Periodic nTimes Anonymous Authentication, Jan Camenisch1 , Susan
           Hohenberger1 , Markulf Kohlweiss2 , Anna Lysyanskaya3 , Mira Meyerovich3 , 1 Zurich Research Lab IBM
           Research, 2 Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 3 Computer Science Dept.,
           Brown University.




                                              Ankit Singh       Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography V
           V-tokens for Conditional Pseudonymity in VANETs. Florian Schaub∗ , Frank Kargel† , Zhendong Ma∗ , and
           Michael Weber∗ . ∗ Institute of Media Informatics, Ulm University, Germany, † Distributed and Embedded
           Security, University of Twente, The Netherlands.

           A Restricted Multi-show Credential System and Its Application on E-Voting, Joseph K. Liu1 and Duncan S.
           Wong2 , 1 Department of Information Engineering, The Chinese University of Hong Kong Shatin, Hong
           Kong, 2 Department of Computer Science, City University of Hong Kong Kowloon, Hong Kong.

           Anonymous k-Show Credentials, Mohamed Layouni and Hans Vangheluwe, School of Computer Science,
           McGill University, 3480 University Street, Montreal, H3A 2A7, Quebec, Canada.

           An integer commitment scheme based on groups with hidden order. Ivan Damøard and Eiichiro Fujisaki. In
           Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Sciences, pages
           431- 444. Springer Verlag, 2000.

           Efficient attributes for anonymous credentials. Jan Camenisch and Thomas Gross. In Peng Ning, Paul F.
           Syverson, and Somesh Jha, editors, ACS Conference on Computer and communications Security, pages
           345-356, 2008.

           Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of
           Automotive IT Applications, Marko Wolf.

           The Sybil Attack, John R. Douceur, Microsoft Research.



                                             Ankit Singh       Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography VI
           How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by
           Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com

           Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas
           Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America,
           Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering.

           DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs,
           http://www.leearmstrong.com/DSRC/DSRCHomeset.htm Last Access: June 25, 2012.

           Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han
           Ho, and Xuemin (Sherman) Shen, University of Waterloo.

           Mandatory Enforcement of Privacy policies using Trusted Computing Principles, Frank Kargl, University of
           Twente, The Netherlands, Florian Schaub and Stefan Dietzel, Ulm University, Germany, Published in 2010,
           Association for the Advancement of Artificial Intelligence (www.aaai.org).

           Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute
           of Media Informatics.
           The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer
           Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL,
           Switzerland.



                                             Ankit Singh       Restricted Usage of Anonymous Credentials in VANET for Misb
Introduction to Vehicular Ad-hoc Network (VANET)
                                       Problem Statement
         IT Security and Privacy requirements in VANET
Design and Implementation of ACS Protocols for VANET
                    Analysis, Conclusion and Future Work
                                             Bibliography


Bibliography VII
           Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory
           of computer Communications and Applications (LCA), School of Computer and Communication Sciences,
           EPFL, Switzerland.

           Trusted Platform Module (TPM) Main Specification, Online Website: Trusted Computer Group (TCG).
           http://www.trustedcomputinggroup.org/resources/tpm_main_specification Last Access: June 25,
           2012.
           Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler.
                                                                                                     u

           M.Sc. Program, High Integrity System, University of Applied Sciences, Frankfurt am Main, Germany:
           http://tinyurl.com/high-integrity-systems Last Access: June 25, 2012.

           Database Management Systems, Third Edition, Ramakrishnan and Gehrke




                                             Ankit Singh      Restricted Usage of Anonymous Credentials in VANET for Misb

Más contenido relacionado

La actualidad más candente

Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksMichele Weigle
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionAlexander Schellong
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET Journal
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Mocke Tech
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & maneteSAT Journals
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSIJNSA Journal
 
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...Janith Rukman
 
Power point messaging accelerating c-v2x commercialization
Power point messaging   accelerating c-v2x commercializationPower point messaging   accelerating c-v2x commercialization
Power point messaging accelerating c-v2x commercializationQualcomm Research
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectBen Othman
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 

La actualidad más candente (20)

VANET
VANETVANET
VANET
 
Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular Networks
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEWVANET SECURITY AND PRIVACY – AN OVERVIEW
VANET SECURITY AND PRIVACY – AN OVERVIEW
 
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart CitiesLocking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
Smart CAN Cable -- Another proposal of intrusion prevention system (IPS) for ...
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...
Driver Development for IEEE WAVE (802.11p/1609.x) based wireless module with ...
 
Power point messaging accelerating c-v2x commercialization
Power point messaging   accelerating c-v2x commercializationPower point messaging   accelerating c-v2x commercialization
Power point messaging accelerating c-v2x commercialization
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_Project
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 

Destacado

Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel SystemsAnkit Singh
 
Dane presentation
Dane presentationDane presentation
Dane presentationAnkit Singh
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command ProtocolAnkit Singh
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationAnkit Singh
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio CommunicationAnkit Singh
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationAnkit Singh
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationAnkit Singh
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault ToleranceAnkit Singh
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways SystemAnkit Singh
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German UnityAnkit Singh
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 

Destacado (20)

Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel Systems
 
Dane presentation
Dane presentationDane presentation
Dane presentation
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command Protocol
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope Application
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio Communication
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project Presentation
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B Presentation
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways System
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German Unity
 
VANET
VANETVANET
VANET
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Similar a Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection

A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET IJECEIAES
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearssarancbe2002
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...IJECEIAES
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
SDN in the Enterprise
SDN in the EnterpriseSDN in the Enterprise
SDN in the EnterpriseCisco Canada
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfOpenStack Foundation
 
Employing Internet of Things Technologies for Building Automation
Employing Internet of Things Technologies for Building Automation Employing Internet of Things Technologies for Building Automation
Employing Internet of Things Technologies for Building Automation Dimitrios Amaxilatis
 
OpenStack Quantum Network Service
OpenStack Quantum Network ServiceOpenStack Quantum Network Service
OpenStack Quantum Network ServiceLew Tucker
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVNAIM Networks, Inc.
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesPARC, a Xerox company
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Ericsson Labs
 
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...JAYAPRAKASH JPINFOTECH
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Praxistage
 

Similar a Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection (20)

A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
SDN in the Enterprise
SDN in the EnterpriseSDN in the Enterprise
SDN in the Enterprise
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Employing Internet of Things Technologies for Building Automation
Employing Internet of Things Technologies for Building Automation Employing Internet of Things Technologies for Building Automation
Employing Internet of Things Technologies for Building Automation
 
OpenStack Quantum Network Service
OpenStack Quantum Network ServiceOpenStack Quantum Network Service
OpenStack Quantum Network Service
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
An Efficient Privacy-Preserving MutualAuthenticationScheme for Secure V2VComm...
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)
 

Más de Ankit Singh

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...Ankit Singh
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The SupercomputerAnkit Singh
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative LinuxAnkit Singh
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCPAnkit Singh
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportAnkit Singh
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettesAnkit Singh
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And ManualAnkit Singh
 

Más de Ankit Singh (7)

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The Supercomputer
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative Linux
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCP
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project report
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettes
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And Manual
 

Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection

  • 1. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Restricted Usage of Anonymous Credentials in VANET for Misbehavior Detection Ankit Singh Fraunhofer SIT, Darmstadt, Germany June 25, 2012 Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 2. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography 1 Introduction to Vehicular Ad-hoc Network (VANET) Overview of Basic Components in VANETs 2 Problem Statement What is the privacy issue in VANET? 3 IT Security and Privacy requirements in VANET Requirements 4 Design and Implementation of ACS Protocols for VANET Assumptions made for Designing the ACS protocols Players Participating in different Protocols Proposed Protocols Implementation of the Proposed Protocols and Contributions 5 Analysis, Conclusion and Future Work Analysis and Discussions Conclusion of the Thesis Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 3. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Future work of the Thesis 6 Bibliography Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 4. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Overview of Basic Components in VANETs Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography What is VANET and Why we need VANET? I Safe and Secure travel Free flow of traffic Infotainment services Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 5. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Overview of Basic Components in VANETs Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Overview of Basic Components in VANETs I Basic Component of VANET Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 6. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET? Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Problem Statement I Vehicle A broadcasting message of traffic Jam Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 7. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET? Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Problem Statement II Vehicle A broadcasting message signed using a classical certificate Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 8. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET? Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Problem Statement III Vehicle A broadcasting message signed using a pseudonymous certificate Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 9. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET What is the privacy issue in VANET? Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Problem Statement IV Vehicle A broadcasting same message signed using multiple pseudonymous certificates Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 10. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Requirements Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Requirements I Security Requirements Privacy Requirements Authentication Anonymity Accountability Unlinkability Verification of Data Consistency Restricted Credential usage Availability Perfect forward privacy Non-repudiation Credential revocation Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 11. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different Protocols Design and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions Bibliography Assumptions I Strong trust on issuer party Tamper proof storage device. Negotiations on attributes etc. are done before beginning of the protocols. Secure channel. Broadcasting messages. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 12. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different Protocols Design and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions Bibliography Players participating in different protocols I Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 13. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different Protocols Design and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions Bibliography Proposed Protocols I Two versions of protocols are proposed for the problem statements: Setup protocol (common to both versions) Version 1 without revocation Issuance protocol V1: - Strong privacy. Signing protocol V1: - Achieved restricted usage of credential. Verifying protocol V1: - Detects fraud at verifier vehicle side - No revocation request. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 14. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different Protocols Design and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions Bibliography Proposed Protocols II Version 2 with revocation Issuance protocol V2: - Weak privacy. - Adapted from V1. - Generates tracing ID. Signing protocol V2: - Adapted from V1 and randomizes tracing ID. Verifying protocol V2: - Adapted from V1 and revocation request Tracing and Revocation protocol: - Tracing of the fraud vehicle - Revocation of the credential. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 15. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Assumptions made for Designing the ACS protocols IT Security and Privacy requirements in VANET Players Participating in different Protocols Design and Implementation of ACS Protocols for VANET Proposed Protocols Analysis, Conclusion and Future Work Implementation of the Proposed Protocols and Contributions Bibliography Implementation and Contributions I Designed Anonymous credential protocols for VANET Idemix java cryptographic library The Library was modified and extended: Support limited spending. Used domain pseudonyms for binding it to a time frame. Generating tracing ID. Generating multiple pseudonyms and saving it to a file. Randomizing tracing ID during signing protocol. Contributed in detecting the fraud at the receiver side. Modified library for preforming revocation. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 16. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the Thesis Design and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work Bibliography Analysis and Discussions I Security requirements fulfilled ( : achieved; ◦: out of scope of this thesis) of data consistency Restricted cre- Authentication Credential Re- Confidentiality Accountability dential usage Verification repudiation Availability vocation Non- ◦ ◦ Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 17. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the Thesis Design and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work Bibliography Analysis and Discussions II Privacy requirements fulfilled ( : achieved; ◦: out of scope of this thesis) Minimum dis- for- ward privacy Unlinkability Distributed Anonymity Resolution Authority Perfect closure ◦ Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 18. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the Thesis Design and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work Bibliography Conclusion I Successfully ‘achieved restricted usage of anonymous credentials in VANET’. Successfully ‘detected the fraud of overspending anonymous credentials by vehicles’. Successfully ‘achieved revocation of the defaulter vehicle’s anonymous credential’. Challenge in the usage of the proposed protocols in VANET due to: Performance overhead of the protocols Signed message size Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 19. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement Analysis and Discussions IT Security and Privacy requirements in VANET Conclusion of the Thesis Design and Implementation of ACS Protocols for VANET Future work of the Thesis Analysis, Conclusion and Future Work Bibliography Future work I Signing and Verifying protocol must be optimized to reduce the execution time Revocation protocol performance and strategy must be optimized Credential update should be made compulsory for the vehicle (Specially for revocation) Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 20. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography I Handbook of Applied Cryptography, Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone (http://cacr.uwaterloo.ca/hac/). SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE, DAVID CHAUM, Communications of the ACM, October 1985, Volume 28, Number 10. Privacy Requirements in Vehicular Communications Systems, Florian Schaub, Zhendong Ma, and Frank Kargl, Institute of Media Informatics, Ulm University, Germany. A signature scheme with efficient protocols. Jan Camenisch and Anna Lysyanskaya. In Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer Verlag, 2003. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Jan Camenisch1 , Anna Lysyanskaya2 ,1 IBM Research, Zurich Research Laboratory CH-8803, R¨schlikon,2 MIT u LCS, 545 Technology Square, Cambridge, MA 02139 USA. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Jan Camenisch and Anna Lysyanskaya. In Birgit Pfitzmann, editor, Advances in Cryptology — EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 21. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography II PRIME - Privacy and Identity Management for Europe. https://www.prime-project.eu/ Last Access: June 25, 2012. IBM software safeguards consumer identity on the Web, IDEMIX, http://www.zurich.ibm.com/news/07/idemix.html and official Idemix blog: http://idemix.wordpress.com/ Last Access: June 25, 2012. Design and Implementation of the idemix Anonymous Credential System, Jan Camenisch and Els Van Herreweghen, IBM Research, Zurich Research Laboratory, Switzerland. Specification of the Identity Mixer Cryptographic Library, Version 2.3.3, IBM Research - Zurich, June 3, 2011. Idemix Java library source download https://prime.inf.tu-dresden.de/idemix/ Last Access: June 25, 2012. How to Explain Zero-Knowledge Protocols to Your Childern. QuisQuater Jean-Jacques(1) , Myriam, Muriel, Micha¨l GUILLOU Louis(2) , Marie Annick, Ga¨ Anna, Gwenol´, Soazig in collaboration with Tom e ıd, e BERSON(3) for the English version. (1) Philips Research Laboratory, Avenue Van Becelaere, 2, B-1170 (2) Brussels, Belgium. CCETT/EPT, BP 59, F-35512 Cesson S´vign´, France. (3) Anagram Laboratories, e e P.O. Box 791, Palo Alto CA 94301, USA. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 22. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography III Threshold Anonymous Announcement in VANETs, March 2011, Liqun Chen Member, IEEE Hewlett Packard Labs, Bristol, United Kingdom, Siaw-Lynn Ng, Department of Mathmatics, Royal Holloway, University of London, Egham, Surrey, United Kingdom and Guilin Wang, School of computer Science and Software Engineering, University of Wollongong, NSW, Australia. DAA: Fixing the pairing based protocols. L. Chen, P. Morrissey and N. P. Smart. Cryptology ePrint Archive: Report 2009/198, Withdrawn due to Major Flaw from http://eprint.iacr.org/2009/198 Last Access: June 25, 2012 K-times anonymous authentication (extended abstract). I. Teranishi, J. Furukawa, and K. Sako. Internet Systems Research Laboratories, NEC Corporation 1753 Shimonumabe, Nakahara-Ku, Kawasaki 211-8666, Japan. Commitment schemes and zero-knowledge protocols, 2007, I. Damg˚rd and J. B. Nielsen. a A GENERIC PUBLIC KEY INFRASTRUCTURE FOR SECURING CAR-TO-X COMMUNICATION. Norbert Bißmeyer1 , Hagen St¨bing2 , Elmar Schoch3 , Stefan G¨tz4 , Jan Peter Stotz1 , Brigitte Lonc5 . 1 Fraunhofer u o SIT, Secure Mobile Systems, 64295 Darmstadt, Germany. 2 Adam Opel AG, Active Safety, 65423 R¨sselsheim, Germany,3 Volkswagen AG, Security and Connectivity, 38436 Wolfsburg, Germany, u 4 Continental Teves AG & Co. oHG, Connected Systems, 60488, Frankfurt/Main, Germany, 5 RENAULT S.A.S., Electronic Systems Engineering Department, 1 Avenue du Golf, 78288 Guyancourt Cedex, France. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 23. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography IV Analysis of Revocation Strategies for Anonymous Idemix Credentials, Jorn Lapon1 , Markulf Kohlweiss3 , Bart de Decker2 , and Vincent Naessens1 , 1 Katholieke Hogeschool Sint-Lieven, Industrial Engineering, 2 Katholieke Universiteit Leuven, CS-DISTRINET, 3 Microsoft Research, Cambridge. Signature Schemes and Applications to Cryptographic Protocol Design. Anna Lysyanskaya. Ph.D. thesis, Massachusetts Institute of Technology, September 2002. Theft and Misuse Protection for Anonymous Credentials, Patrick Bichsel, Master Thesis MA-2007-42, June 2007 to November 2007, ETH, Switzerland. Master Thesis KATHOLIEKE UNIVERSITEIT LEUVEN: Smart Card Implementation of Anonymous Credentials, Josep Balasch, 2007 - 2008, Promotor: Prof. Dr. Ir. Bart Preneel. Smart card integration in the pseudonym system idemix, Luuk Danes, Master Thesis 18 December 2007, University of Groningen, faculty of mathematics and natural sciences. How to Win the Clone Wars: Efficient Periodic nTimes Anonymous Authentication, Jan Camenisch1 , Susan Hohenberger1 , Markulf Kohlweiss2 , Anna Lysyanskaya3 , Mira Meyerovich3 , 1 Zurich Research Lab IBM Research, 2 Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 3 Computer Science Dept., Brown University. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 24. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography V V-tokens for Conditional Pseudonymity in VANETs. Florian Schaub∗ , Frank Kargel† , Zhendong Ma∗ , and Michael Weber∗ . ∗ Institute of Media Informatics, Ulm University, Germany, † Distributed and Embedded Security, University of Twente, The Netherlands. A Restricted Multi-show Credential System and Its Application on E-Voting, Joseph K. Liu1 and Duncan S. Wong2 , 1 Department of Information Engineering, The Chinese University of Hong Kong Shatin, Hong Kong, 2 Department of Computer Science, City University of Hong Kong Kowloon, Hong Kong. Anonymous k-Show Credentials, Mohamed Layouni and Hans Vangheluwe, School of Computer Science, McGill University, 3480 University Street, Montreal, H3A 2A7, Quebec, Canada. An integer commitment scheme based on groups with hidden order. Ivan Damøard and Eiichiro Fujisaki. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Sciences, pages 431- 444. Springer Verlag, 2000. Efficient attributes for anonymous credentials. Jan Camenisch and Thomas Gross. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACS Conference on Computer and communications Security, pages 345-356, 2008. Security Engineering for Vehicular IT Systems, Improving the Trustworthiness and Dependability of Automotive IT Applications, Marko Wolf. The Sybil Attack, John R. Douceur, Microsoft Research. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 25. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography VI How much does software add to the cost of today’s vehicles? How about tomorrow’s electric cars? by Sebastian Blanco on Jun 8th 2010, at Auto Blog Green: autobloggreen.com Design of 5.9GHz DSRC-based Vehicular Safety Communication, Daniel Jiang1 , Vikas Taliwal1 , Andreas Meier1 , Wieland Holfelder1 , Ralf Herrtwich2 , 1 DaimlerChrysler Research and Technology North America, Inc., 2 DaimlerChrysler AG, Vehicle IT and Services Research and Advanced Engineering. DSRC range comparison with FM Radio, cellular Phone, Satellite, Check FAQs, http://www.leearmstrong.com/DSRC/DSRCHomeset.htm Last Access: June 25, 2012. Security in Vehicular Ad Hoc Networks, Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin (Sherman) Shen, University of Waterloo. Mandatory Enforcement of Privacy policies using Trusted Computing Principles, Frank Kargl, University of Twente, The Netherlands, Florian Schaub and Stefan Dietzel, Ulm University, Germany, Published in 2010, Association for the Advancement of Artificial Intelligence (www.aaai.org). Security Engineering for VANETs, Frank Kargl, Zhendong Ma, and Elmar Schoch, Ulm University, Institute of Media Informatics. The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland. Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb
  • 26. Introduction to Vehicular Ad-hoc Network (VANET) Problem Statement IT Security and Privacy requirements in VANET Design and Implementation of ACS Protocols for VANET Analysis, Conclusion and Future Work Bibliography Bibliography VII Securing Vehicular Communications, Maxim Raya, Panos Papadimitratos, Jean-Pierre Hubaux, Laboratory of computer Communications and Applications (LCA), School of Computer and Communication Sciences, EPFL, Switzerland. Trusted Platform Module (TPM) Main Specification, Online Website: Trusted Computer Group (TCG). http://www.trustedcomputinggroup.org/resources/tpm_main_specification Last Access: June 25, 2012. Privacy in VANETs using Changing Pseudonyms - Ideal and Real, Matthias Gerlach and Felix G¨ttler. u M.Sc. Program, High Integrity System, University of Applied Sciences, Frankfurt am Main, Germany: http://tinyurl.com/high-integrity-systems Last Access: June 25, 2012. Database Management Systems, Third Edition, Ramakrishnan and Gehrke Ankit Singh Restricted Usage of Anonymous Credentials in VANET for Misb