V-Tokens for Conditional Pseudonymity in VANETs

Florian Schaub, Frank Kargl, Zhendong Ma, M. Weber

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    38 Citations (Scopus)
    95 Downloads (Pure)

    Abstract

    Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical applications. Conditional pseudonymity, i.e., usage of resolvable pseudonyms, is a common approach to address both. Often, resolvability of pseudonyms is achieved by authorities maintaining pseudonym- identity mappings. However, these mappings are privacy sensitive and require strong protection to prevent abuse or leakage. We present a new approach that does not rely on pseudonym-identity mappings to be stored by any party. Resolution information is directly embedded in pseudonyms and can only be accessed when multiple authorities cooperate. Our privacy-preserving pseudonym issuance protocol ensures that pseudonyms contain valid resolution information but prevents issuing authorities from creating pseudonym-identity mappings.
    Original languageUndefined
    Title of host publicationIEEE Wireless Communications and Networking Conference (WCNC 2010)
    Place of PublicationLos Alamitos
    PublisherIEEE Computer Society Press
    Pages1-6
    Number of pages6
    ISBN (Print)978-1-4244-6396-1
    DOIs
    Publication statusPublished - Apr 2010
    EventIEEE Wireless Communications & Networking Conference, WCNC 2010 - Sydney, Australia
    Duration: 18 Apr 201021 Apr 2010
    http://wcnc2010.ieee-wcnc.org/

    Publication series

    Name
    PublisherIEEE Computer Society Press

    Conference

    ConferenceIEEE Wireless Communications & Networking Conference, WCNC 2010
    Abbreviated titleWCNC
    CountryAustralia
    CitySydney
    Period18/04/1021/04/10
    Internet address

    Keywords

    • METIS-276061
    • SCS-Cybersecurity
    • EWI-18157
    • IR-72422

    Cite this