Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough

B. Wiedersheim, Zhendong Ma, Frank Kargl, P. Papadimitratos

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    173 Citations (Scopus)
    238 Downloads (Pure)

    Abstract

    Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security architectures are aware of the problem and provide privacy enhancing mechanisms, notably pseudonymous authentication. However, the granularity and the amount of location information IVC protocols divulge, enable an adversary that eavesdrops all traffic throughout an area, to reconstruct long traces of the whereabouts of the majority of vehicles within the same area. Our analysis in this paper confirms the existence of this kind of threat. As a result, it is questionable if strong location privacy is achievable in IVC systems against a powerful adversary.
    Original languageUndefined
    Title of host publicationThe Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010)
    Place of PublicationLos Alamitos
    PublisherIEEE
    Pages176-183
    Number of pages8
    ISBN (Print)978-1-4244-6059-5
    DOIs
    Publication statusPublished - Feb 2010
    Event7th International Conference on Wireless On-demand Network Systems and Services, WONS 2010 - Hotel Larix, Kranska Gora, Slovenia
    Duration: 3 Feb 20105 Feb 2010
    Conference number: 7

    Publication series

    Name
    PublisherIEEE Computer Society Press

    Conference

    Conference7th International Conference on Wireless On-demand Network Systems and Services, WONS 2010
    Abbreviated titleWONS
    Country/TerritorySlovenia
    CityKranska Gora
    Period3/02/105/02/10

    Keywords

    • METIS-275612
    • IR-72418
    • IVC protocols
    • state-of-the-art security architectures
    • EWI-18153
    • privacy enhancing mechanisms
    • location information
    • inter-vehicle communication systems
    • SCS-Cybersecurity
    • pseudonymous authentication

    Cite this