
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks
Author(s) -
Yingying Yao,
Xiaolin Chang,
Lin Li,
Jiqiang Liu,
Hong Wang
Publication year - 2022
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2022.3222302
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services. The navigation service provider (NSP) utilizes road condition information from nearby vehicles collected by roadside units (RSUs) to guide a vehicle through an optimal route provided by the navigation services. This paper mainly focuses on tackling three key issues in such navigation system. Firstly, it is essential to ensure the privacy of the vehicles’ personal identifiable information (PII). Secondly, the location, start point destination and route of the vehicle should not be leaked to RSUs and also should not be linked to its PII by RSUs and NSP. Thirdly, the process of vehicles obtaining the navigation services should be lightweight. Because of such problems, this paper proposes a dual privacy-preserving lightweight navigation system for vehicular networks through designing a novel signature scheme and combining other cryptographic primitives to keep dual privacy including PII and route related information. And the correctness analysis of the proposed system, security proof of the designed signature scheme adopted in the proposed system, and privacy analysis of the system are thoroughly provided. In addition, the performance of the proposed system is evaluated and compared with the existing systems to illustrate that the proposed system is efficient.