2010
DOI: 10.1007/978-3-642-15497-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Privacy for Vehicular Mix-Zones

Abstract: Abstract. Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehicle to be tracked. Mix-zones, where vehicles encrypt their transmissions and then change their identifiers, have been proposed as a solution to this problem. In this work, we describe a formal analysis of mix-zones. We model a mix-zone and propose a formal definition of privacy for such a zone. We give a set of necessary con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…The second simplifying abstraction appears to be reasonable since TPMs can be simulated by the adversarial context. Indeed, this is a typical simplification in symbolic models, for example, definitions of ballot secrecy for electronic voting [KR05, DKR06, BHM08] and privacy for vehicular ad hoc networks [DDS10] also fix the set of honest participants. However, it is unknown if these simplifications are sound.…”
Section: Linkmentioning
confidence: 99%
“…The second simplifying abstraction appears to be reasonable since TPMs can be simulated by the adversarial context. Indeed, this is a typical simplification in symbolic models, for example, definitions of ballot secrecy for electronic voting [KR05, DKR06, BHM08] and privacy for vehicular ad hoc networks [DDS10] also fix the set of honest participants. However, it is unknown if these simplifications are sound.…”
Section: Linkmentioning
confidence: 99%
“…Equivalences have already been used to model privacy properties in formal analysis for e.g. vehicular mix-zones [10] and electronic voting [11,15]. The precise notion used is often observational equivalence but as we will explain, it happens that this notion is too strong to analyse interactive zero-knowledge protocols.…”
Section: Privacy For Interactive Zero-knowledge Protocolsmentioning
confidence: 99%
“…In this paper, we bring the privacy analysis of location-based services into the world of formal methods, leveraging previous work on privacy for vehicular mix-zones [10], electronic voting [11,15], and RFID tags [3,8]. In particular, we concentrate on VPriv [7], a proposed scheme for building location-based services using zero-knowledge techniques, designed to ensure that the paths of drivers are not revealed to the service providers, while nonetheless preventing drivers from reporting fake paths.…”
Section: Introductionmentioning
confidence: 99%
“…Given the presence of a global passive adversary, Freudiger et al [6] proposed the CMIX protocol to create cryptographic mix zones at road intersections. Dahl et al [20] improved the cryptographic approach by fixing the key establishment protocol in CMIX. A more sophisticated protocol, MobiMix [7], improved attack resilience by considering various factors, e.g., traffic density, user moving patterns, and etc.…”
Section: Related Workmentioning
confidence: 99%