Abstract
Safety-critical applications in cooperative vehicular networks require authentication of nodes and messages. Yet, privacy of individual vehicles and drivers must be maintained. Pseudonymity can satisfy both security and privacy requirements. Thus, a large body of work emerged in recent years, proposing pseudonym solutions tailored to vehicular networks. In this survey, we detail the challenges and requirements for such pseudonym mechanisms, propose an abstract pseudonym lifecycle, and give an extensive overview and categorization of the state of the art in this research area. Specifically, this survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication. We compare the different approaches, give an overview of the current state of standardization, and identify open research challenges.
| Original language | English |
|---|---|
| Pages (from-to) | 228-255 |
| Number of pages | 28 |
| Journal | IEEE communications surveys & tutorials |
| Volume | 17 |
| Issue number | 1 |
| Early online date | 7 Aug 2014 |
| DOIs | |
| Publication status | Published - Mar 2015 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 11 Sustainable Cities and Communities
Keywords
- Anonymity
- Privacy
- Intelligent transport systems
- Vehicular ad hoc networks
- Untraceability
- Pseudonym
- EC Grant Agreement nr.: FP7/269994
- Authentication
- ITS
- V2X communications
- VANET
- Unlinkability
- SCS-Cybersecurity
- n/a OA procedure
Fingerprint
Dive into the research topics of 'Pseudonym schemes in vehicular networks: A survey'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver