2017
DOI: 10.1155/2017/3041749
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

Abstract: In Vehicular Ad Hoc Networks (VANETs) used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications implemented with the Dedicated Short Range Communications (DSRC) standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Therefore, these solutions are not viable for critical infrastructure communication in 5G. Thus a higher level of security for critical communication is achievable by utilizing new security mechanisms such as physical layer security adopting Radio-Frequency (RF) fingerprinting [58], using asymmetric security schemes [59] and dynamically changing security parameters according to the situation [21]. Similarly, end-to-end user communication can be secured by using cryptographic protocols like HIP as presented in [60].…”
Section: Security Solutions For Communication Channelsmentioning
confidence: 99%
“…Therefore, these solutions are not viable for critical infrastructure communication in 5G. Thus a higher level of security for critical communication is achievable by utilizing new security mechanisms such as physical layer security adopting Radio-Frequency (RF) fingerprinting [58], using asymmetric security schemes [59] and dynamically changing security parameters according to the situation [21]. Similarly, end-to-end user communication can be secured by using cryptographic protocols like HIP as presented in [60].…”
Section: Security Solutions For Communication Channelsmentioning
confidence: 99%