V-Tokens for Conditional Pseudonymity in VANETs

Florian Schaub, Frank Kargl, Zhendong Ma, Michael Weber

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    54 Citations (Scopus)
    155 Downloads (Pure)

    Abstract

    Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical applications. Conditional pseudonymity, i.e., usage of resolvable pseudonyms, is a common approach to address both. Often, resolvability of pseudonyms is achieved by authorities maintaining pseudonym- identity mappings. However, these mappings are privacy sensitive and require strong protection to prevent abuse or leakage. We present a new approach that does not rely on pseudonym-identity mappings to be stored by any party. Resolution information is directly embedded in pseudonyms and can only be accessed when multiple authorities cooperate. Our privacy-preserving pseudonym issuance protocol ensures that pseudonyms contain valid resolution information but prevents issuing authorities from creating pseudonym-identity mappings.
    Original languageEnglish
    Title of host publicationIEEE Wireless Communications and Networking Conference (WCNC 2010)
    Place of PublicationLos Alamitos, CA
    PublisherIEEE
    Pages1-6
    Number of pages6
    ISBN (Electronic)978-1-4244-6398-5
    ISBN (Print)978-1-4244-6396-1
    DOIs
    Publication statusPublished - Apr 2010
    EventIEEE Wireless Communications & Networking Conference, WCNC 2010 - Sydney, Australia
    Duration: 18 Apr 201021 Apr 2010
    http://wcnc2010.ieee-wcnc.org/

    Publication series

    NameIEEE Wireless Communication and Networking Conference
    PublisherIEEE
    Volume2010
    ISSN (Print)1525-3511
    ISSN (Electronic)1558-2612

    Conference

    ConferenceIEEE Wireless Communications & Networking Conference, WCNC 2010
    Abbreviated titleWCNC
    Country/TerritoryAustralia
    CitySydney
    Period18/04/1021/04/10
    Internet address

    Keywords

    • SCS-Cybersecurity
    • n/a OA procedure

    Fingerprint

    Dive into the research topics of 'V-Tokens for Conditional Pseudonymity in VANETs'. Together they form a unique fingerprint.

    Cite this