Abstract
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security architectures are aware of the problem and provide privacy enhancing mechanisms, notably pseudonymous authentication. However, the granularity and the amount of location information IVC protocols divulge, enable an adversary that eavesdrops all traffic throughout an area, to reconstruct long traces of the whereabouts of the majority of vehicles within the same area. Our analysis in this paper confirms the existence of this kind of threat. As a result, it is questionable if strong location privacy is achievable in IVC systems against a powerful adversary.
Original language | Undefined |
---|---|
Title of host publication | The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010) |
Place of Publication | Los Alamitos |
Publisher | IEEE |
Pages | 176-183 |
Number of pages | 8 |
ISBN (Print) | 978-1-4244-6059-5 |
DOIs | |
Publication status | Published - Feb 2010 |
Event | 7th International Conference on Wireless On-demand Network Systems and Services, WONS 2010 - Hotel Larix, Kranska Gora, Slovenia Duration: 3 Feb 2010 → 5 Feb 2010 Conference number: 7 |
Publication series
Name | |
---|---|
Publisher | IEEE Computer Society Press |
Conference
Conference | 7th International Conference on Wireless On-demand Network Systems and Services, WONS 2010 |
---|---|
Abbreviated title | WONS |
Country/Territory | Slovenia |
City | Kranska Gora |
Period | 3/02/10 → 5/02/10 |
Keywords
- METIS-275612
- IR-72418
- IVC protocols
- state-of-the-art security architectures
- EWI-18153
- privacy enhancing mechanisms
- location information
- inter-vehicle communication systems
- SCS-Cybersecurity
- pseudonymous authentication