Pseudonym schemes in vehicular networks: A survey

Jonathan Petit, Florian Schaub, Michael Feiri, Frank Kargl

    Research output: Contribution to journalArticleAcademicpeer-review

    332 Citations (Scopus)
    36 Downloads (Pure)


    Safety-critical applications in cooperative vehicular networks require authentication of nodes and messages. Yet, privacy of individual vehicles and drivers must be maintained. Pseudonymity can satisfy both security and privacy requirements. Thus, a large body of work emerged in recent years, proposing pseudonym solutions tailored to vehicular networks. In this survey, we detail the challenges and requirements for such pseudonym mechanisms, propose an abstract pseudonym lifecycle, and give an extensive overview and categorization of the state of the art in this research area. Specifically, this survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication. We compare the different approaches, give an overview of the current state of standardization, and identify open research challenges.
    Original languageEnglish
    Pages (from-to)228-255
    Number of pages28
    JournalIEEE communications surveys & tutorials
    Issue number1
    Early online date7 Aug 2014
    Publication statusPublished - Mar 2015


    • Anonymity
    • Privacy
    • intelligent transport systems
    • vehicular ad hoc networks
    • untraceability
    • pseudonym
    • EC Grant Agreement nr.: FP7/269994
    • Authentication
    • ITS
    • V2X communications
    • VANET
    • Unlinkability
    • SCS-Cybersecurity
    • n/a OA procedure


    Dive into the research topics of 'Pseudonym schemes in vehicular networks: A survey'. Together they form a unique fingerprint.

    Cite this