skip to main content
10.1145/3212480.3226101acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Privacy Preservation through Uniformity

Published:18 June 2018Publication History

ABSTRACT

Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authentication secures communication while enhancing user privacy thanks to a set of anonymized certificates, termed pseudonyms. Vehicles switch the pseudonyms (and the corresponding private key) frequently; we term this pseudonym transition process. However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseudonyms based on the times of pseudonym transition processes. In this poster, we show how one can link pseudonyms of a given vehicle by simply looking at the timing information of pseudonym transition processes. We also propose "mix-zone everywhere": time-aligned pseudonyms are issued for all vehicles to facilitate synchronous pseudonym update; as a result, all vehicles update their pseudonyms simultaneously, thus achieving higher user privacy protection.

References

  1. L. Buttyán and et al. 2009. SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs. In IEEE VNC. 1--8.Google ScholarGoogle Scholar
  2. L. Codeca and et al. 2015. Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. In IEEE VNC. Kyoto, Japan.Google ScholarGoogle Scholar
  3. S. Eichler. 2007. Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks Depending on Node Mobility. In IEEE Intelligent Vehicles Symposium. 541--546.Google ScholarGoogle Scholar
  4. J. Freudiger and et al. 2007. Mix-zones for Location Privacy in Vehicular Networks. In Win-ITS. Vancouver, BC, Canada.Google ScholarGoogle Scholar
  5. P. Golle and K. Partridge. 2009. On the Anonymity of Home/Work Location Pairs. In Pervasive computing. Springer, 390--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Khodaei and et al. 2016. Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems. In IoV/VoI. Paderborn, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Khodaei and et al. 2018. SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems. IEEE Transactions on Intelligent Transportation Systems 19, 5 (May 2018), 1430--1444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Khodaei, H. Jin, and P. Papadimitratos. 2014. Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure. In IEEE VNC. Paderborn, Germany.Google ScholarGoogle Scholar
  9. M. Khodaei, A. Messing, and P. Papadimitratos. 2017. RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd. In IEEE VNC. Torino, Italy.Google ScholarGoogle Scholar
  10. M. Khodaei and P. Papadimitratos. 2015. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems. IEEE VT Magazine 10, 4 (Dec. 2015), 63--69.Google ScholarGoogle Scholar
  11. R. Lu and et al. 2012. Pseudonym Changing at Social Spots: An Effective Strategy for Location privacy in VANETs. IEEE TVT 61, 1 (Jan 2012), 86--96.Google ScholarGoogle Scholar
  12. P. Papadimitratos and et al. 2006. Securing Vehicular Communications-Assumptions, Requirements, and Principles. In ESCAR. Berlin, Germany.Google ScholarGoogle Scholar
  13. J. Petit and et al. 2015. Pseudonym Schemes in Vehicular Networks: A Survey. IEEE communications surveys & tutorials 17, 1 (Mar. 2015), 228--255.Google ScholarGoogle Scholar
  14. W. Whyte, A Weimerskirch, V. Kumar, and T. Hehn. 2013. A Security Credential Management System for V2V Communications. In IEEE VNC. Boston, MA.Google ScholarGoogle Scholar
  15. B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos. 2010. Privacy in Inter-Vehicular Networks: Why Simple Pseudonym Change is not Enough. In IEEE International Conference on Wireless On-demand Network Systems and Services. Kranjska Gora, Slovenia. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy Preservation through Uniformity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
        June 2018
        317 pages
        ISBN:9781450357319
        DOI:10.1145/3212480

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • poster
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader