Abstract
Vehicular communication discloses critical information about the vehicle. Association of this information to the drivers put the privacy of the driver at risk. The broadcast of safety messages in plain text is essential for safety applications but not secure with respect to the privacy of the driver. Many pseudonymous schemes are proposed in the literature, yet the level of privacy is not being compared among these schemes. Our contribution in this paper is the identification of the vulnerabilities in the existing pseudonym changing schemes, determining the attacking capabilities of the local-passive attacker and demonstration of the optimal case for an attacker to deploy the network of eavesdropping stations with the feasible attacking capabilities. We have also provided the analysis and comparison of the different pseudonym changing schemes with a new metric to measure tracking ability of the local-passive attacker in highway and urban scenarios as well as with the varying number of attacking stations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Golle, P., Partridge, K.: On the anonymity of home/work location Pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01516-8_26
Petit, J., et al.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015)
Brecht, B., et al.: A security credential management system for V2X communications. IEEE Trans. Intell. Transp. Syst. 99, 1–22 (2018)
Pan, Y., Li, J.: Cooperative pseudonym change scheme based on the number of neighbors in vanets. J. Netw. Comput. Appl. 36(6), 1599–1609 (2013)
Buttyan, L., Holczer, T., Weimerskirch, A., Whyte, W.: SLOW: a practical pseudonym changing scheme for location privacy in vanets. In: 2009 IEEE Vehicular Networking Conference (VNC), pp. 1–8. IEEE (2009)
Wasef, A., Shen, X.S.: REP: location privacy for vanets using random encryption periods. Mob. Netw. Appl. 15(1), 172–185 (2010)
Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), no. LCA-CONF-2007-016 (2007)
Eckhoff, D., Sommer, C., Gansen, T., German, R., Dressler, F.: Strong and affordable location privacy in VANETs: identity diffusion using time-slots and swapping. In: 2010 IEEE Vehicular Networking Conference (VNC), pp. 174–181. IEEE (2010)
Boualouache, A., Moussaoui, S.: S2SI: a practical pseudonym changing strategy for location privacy in VANETs. In: 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp. 70–75. IEEE (2014)
Troncoso, C., Costa-Montenegro, E., Diaz, C., Schiffner, S.: On the difficulty of achieving anonymity for Vehicle-2-X communication. Comput. Netw. 55(14), 3199–3210 (2011)
Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Proceedings of IEEE 7th International Conference on Wireless on Demand Network Systems and Services, pp. 176–183, February 2010
Emara, K., Wolfgang W., Schlichter, J.: CAPS: context-aware privacy scheme for VANET safety applications. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM (2015)
Emara, K.: Poster: PREXT: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE (2016)
Krajzewicz, D., et al.: Recent development and applications of SUMO-Simulation of Urban MObility. Int. J. Adv. Syst. Measur. 5 (2012)
Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Ccommunications, Networks and Systems and Workshops. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)
Sommer, C., German, R., Dressler, F.: Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 10(1), 3–15 (2011)
OpenStreetMap. https://www.openstreetmap.org/copyright. Accessed 08 Mar 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Saini, I., Saad, S., Jaekel, A. (2018). Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET. In: Traore, I., Woungang, I., Ahmed, S., Malik, Y. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2018. Lecture Notes in Computer Science(), vol 11317. Springer, Cham. https://doi.org/10.1007/978-3-030-03712-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-03712-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03711-6
Online ISBN: 978-3-030-03712-3
eBook Packages: Computer ScienceComputer Science (R0)