Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks

David Förster, Frank Kargl, Hans Löhr

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Abstract

The standard approach to privacy-friendly authentication in vehicular ad-hoc networks is the use of pseudonym certificates. The level of location privacy users can enjoy under the threat of an attacker depends on the attacker's coverage and strategy as well as on the users' strategy for changing their pseudonym certificates. With this paper, we propose a generic framework for evaluation and comparison of different pseudonym change strategies with respect to the privacy level they provide under the threat of a realistic, local, passive attacker. To illustrate the applicability of this framework, we propose a new tracking strategy that achieves unprecedented success in vehicle tracking and thus lowers the achievable location privacy significantly. We use this attacker as a means to evaluate different pseudonym change strategies and highlight the need for more research in this direction.

Original languageEnglish
Title of host publicationWiSec '15
Subtitle of host publicationProceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
PublisherAssociation for Computing Machinery (ACM)
Pages1–6
ISBN (Electronic)978-1-4503-3623-9
DOIs
Publication statusPublished - 22 Jun 2015
Event8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015 - New York, United States
Duration: 22 Jun 201526 Jun 2015
Conference number: 8

Conference

Conference8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
Abbreviated titleWiSec 2015
CountryUnited States
CityNew York
Period22/06/1526/06/15

Keywords

  • Location privacy
  • Pseudonym systems
  • Vehicular ad-hoc networks

Fingerprint Dive into the research topics of 'Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks'. Together they form a unique fingerprint.

Cite this