ABSTRACT
Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authentication secures communication while enhancing user privacy thanks to a set of anonymized certificates, termed pseudonyms. Vehicles switch the pseudonyms (and the corresponding private key) frequently; we term this pseudonym transition process. However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseudonyms based on the times of pseudonym transition processes. In this poster, we show how one can link pseudonyms of a given vehicle by simply looking at the timing information of pseudonym transition processes. We also propose "mix-zone everywhere": time-aligned pseudonyms are issued for all vehicles to facilitate synchronous pseudonym update; as a result, all vehicles update their pseudonyms simultaneously, thus achieving higher user privacy protection.
- L. Buttyán and et al. 2009. SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs. In IEEE VNC. 1--8.Google Scholar
- L. Codeca and et al. 2015. Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. In IEEE VNC. Kyoto, Japan.Google Scholar
- S. Eichler. 2007. Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks Depending on Node Mobility. In IEEE Intelligent Vehicles Symposium. 541--546.Google Scholar
- J. Freudiger and et al. 2007. Mix-zones for Location Privacy in Vehicular Networks. In Win-ITS. Vancouver, BC, Canada.Google Scholar
- P. Golle and K. Partridge. 2009. On the Anonymity of Home/Work Location Pairs. In Pervasive computing. Springer, 390--397. Google ScholarDigital Library
- M. Khodaei and et al. 2016. Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems. In IoV/VoI. Paderborn, Germany. Google ScholarDigital Library
- M. Khodaei and et al. 2018. SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems. IEEE Transactions on Intelligent Transportation Systems 19, 5 (May 2018), 1430--1444. Google ScholarDigital Library
- M. Khodaei, H. Jin, and P. Papadimitratos. 2014. Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure. In IEEE VNC. Paderborn, Germany.Google Scholar
- M. Khodaei, A. Messing, and P. Papadimitratos. 2017. RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd. In IEEE VNC. Torino, Italy.Google Scholar
- M. Khodaei and P. Papadimitratos. 2015. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems. IEEE VT Magazine 10, 4 (Dec. 2015), 63--69.Google Scholar
- R. Lu and et al. 2012. Pseudonym Changing at Social Spots: An Effective Strategy for Location privacy in VANETs. IEEE TVT 61, 1 (Jan 2012), 86--96.Google Scholar
- P. Papadimitratos and et al. 2006. Securing Vehicular Communications-Assumptions, Requirements, and Principles. In ESCAR. Berlin, Germany.Google Scholar
- J. Petit and et al. 2015. Pseudonym Schemes in Vehicular Networks: A Survey. IEEE communications surveys & tutorials 17, 1 (Mar. 2015), 228--255.Google Scholar
- W. Whyte, A Weimerskirch, V. Kumar, and T. Hehn. 2013. A Security Credential Management System for V2V Communications. In IEEE VNC. Boston, MA.Google Scholar
- B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos. 2010. Privacy in Inter-Vehicular Networks: Why Simple Pseudonym Change is not Enough. In IEEE International Conference on Wireless On-demand Network Systems and Services. Kranjska Gora, Slovenia. Google ScholarDigital Library
Index Terms
- Privacy Preservation through Uniformity
Recommendations
VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure
WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile NetworksThe central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used ...
Scaling pseudonymous authentication for large mobile systems
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksThe central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used ...
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
Comments