On the difficulty of achieving anonymity for Vehicle-2-X communication

@article{Troncoso2011OnTD,
  title={On the difficulty of achieving anonymity for Vehicle-2-X communication},
  author={Carmela Troncoso and Enrique Costa-Montenegro and Claudia D{\'i}az and Stefan Schiffner},
  journal={Comput. Networks},
  year={2011},
  volume={55},
  pages={3199-3210}
}

Figures and Tables from this paper

Zone Encryption with Anonymous Authentication for V2V Communication
TLDR
Zone-encryption schemes are introduced, where vehicles generate and authentically distribute encryption keys associated to static geographic zones close to their location, and, combined with a suitable anonymous authentication scheme, ensures that messages can only be sent by genuine vehicles, while adding only 224 Bytes of cryptographic overhead to each message.
Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET
TLDR
The identification of the vulnerabilities in the existing pseudonym changing schemes, determining the attacking capabilities of the local-passive attacker, and demonstration of the optimal case for an attacker to deploy the network of eavesdropping stations with the feasible attacking capabilities are provided.
How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme
TLDR
The results suggest that the introduction of VANETs, even with the C-ITS pseudonym scheme, enables the tracking of vehicles, and thus will decrease location privacy in the future.
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios
TLDR
This paper proposes concrete change intervals for urban scenarios, which are higher than currently foreseen, but concludes that privacy protection in uniform traffic conditions remains a challenge.
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks
TLDR
A generic framework for evaluation and comparison of different pseudonym change strategies with respect to the privacy level they provide under the threat of a realistic, local, passive attacker is proposed and a new tracking strategy is proposed that achieves unprecedented success in vehicle tracking and thus lowers the achievable location privacy significantly.
Pseudonym Schemes in Vehicular Networks: A Survey
TLDR
This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
On the Use of Latency Graphs for the Construction of Tor Circuits
TLDR
A new circuit selection algorithm is developed that considerably reduces the success probability of linking attacks while keeping a good degree of performance and is tested on a real-world Tor deployment over PlanetLab.
On the Dissemination of IEEE 802.11p Warning Messages in Distributed Vehicular Urban Networks
TLDR
This chapter presents proposals to enhance the behavior of the standard protocol for disseminating warning messages, some of them changing the specification, and others with the use of location-based information.
...
...

References

SHOWING 1-10 OF 36 REFERENCES
Privacy and Scalability Analysis of Vehicular Combinatorial Certificate Schemes
TLDR
A refinement to the Combinatorial Certificate Scheme is described that improves the innocent vehicle re-key quota lifetime by an order of magnitude and the level of vehicle anonymity that exists in situations of low vehicular density.
The impact of key assignment on VANET privacy
TLDR
This work investigates how to assign keys to vehicles in order to preserve privacy and maintain the authors' guiding VANET design principles and shows that it is impossible to provide good privacy and fast revocation when keys are shared among vehicles.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
TLDR
This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.
Architecture for Secure and Private Vehicular Communications
TLDR
This paper proposes a security architecture for VC that includes the management of identities and cryptographic keys, the security of communications, and the integration of privacy enhancing technologies.
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
TLDR
A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
TLDR
This work proposes transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source.
Location Privacy in Mobile Systems: A Personalized Anonymization Model
  • B. Gedik, Ling Liu
  • Computer Science
    25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
  • 2005
TLDR
A suite of scalable and yet efficient spatio-temporal cloaking algorithms, called CliqueCloak algorithms, are developed to provide high quality personalized location k-anonymity, aiming at avoiding or reducing known location privacy threats before forwarding requests to LBS provider(s).
k-Anonymity: A Model for Protecting Privacy
  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
TLDR
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Location privacy in pervasive computing
TLDR
This chapter focuses on the privacy aspects of using location information in location-based services (LBSs), which are services that take the current position of the user into consideration when performing their tasks.
Anonymous credentials on a standard java card
TLDR
This work presents the first practical implementation of an anonymous credential system on a Java Card 2.2.1, and is the first to act completely autonomously on card and to maintain its properties in the face of an untrusted terminal.
...
...