Proceedings of the 11th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2018
DOI: 10.1145/3212480.3226101
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation through Uniformity

Abstract: Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authentication secures communication while enhancing user privacy thanks to a set of anonymized certificates, termed pseudonyms. Vehicles switch the pseudonyms (and the corresponding private key) frequently; we term this pseudonym transition process. However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Despite a huge reduction in size, such schemes do not provide perfect-forward-privacy [17]: upon a revocation event and CRL release, all the ''non-revoked'' but previously expired pseudonyms belonging to the evicted entity would be linked as well. Although forward-privacy can be achieved by leveraging a hash chain [18], the pseudonyms' issuer can trivially link all pseudonyms belonging to a vehicle, and thus the pseudonymously authenticated messages [38], [39], [40], towards tracking it for the entire duration of its presence in the system [13], [14], [15], [16], [18]. More precisely, the CA specifies a ''time interval'' so that each vehicle receives D pseudonyms during the pseudonym acquisition process [18].…”
Section: Related Workmentioning
confidence: 99%
“…Despite a huge reduction in size, such schemes do not provide perfect-forward-privacy [17]: upon a revocation event and CRL release, all the ''non-revoked'' but previously expired pseudonyms belonging to the evicted entity would be linked as well. Although forward-privacy can be achieved by leveraging a hash chain [18], the pseudonyms' issuer can trivially link all pseudonyms belonging to a vehicle, and thus the pseudonymously authenticated messages [38], [39], [40], towards tracking it for the entire duration of its presence in the system [13], [14], [15], [16], [18]. More precisely, the CA specifies a ''time interval'' so that each vehicle receives D pseudonyms during the pseudonym acquisition process [18].…”
Section: Related Workmentioning
confidence: 99%
“…As a mitigation, vehicles could change their pseudonyms when their speed drops below 30 km/h [8]. But, an adversary can still conduct syntactic linking due to a lack of synchronization among vehicles [9], or track vehicles across pseudonym changes by predicting their trajectories [15].…”
Section: Related Workmentioning
confidence: 99%
“…Syntactic and semantic linking [7], [8] exploit the circumstances under which vehicles change pseudonyms. Based on the time of a transition, an attacker might especially observe an isolated pseudonym change, and associate the old and new identifiers through syntactic linking [8], [9]. During a semantic linking attack, the adversary uses physical constraints of the road layout, velocity, and heading of a victim's vehicle to predict its trajectory and link pseudonyms [7], [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although pseudonymous authentication is a promising approach to protect user privacy, an adversary, eavesdropping all traffic in an area, could link successive pseudonymously authenticated messages. An adversary might observe an isolated pseudonym change, and associate the old and the new pseudonymous identifier through syntactic linking, e.g., [10], [11], [12], [13]. Alternatively, an adversary could leverage the physical constraints of the road layout [14], together with data in message payloads, e.g., location, velocity, time, acceleration, the length and width 1 of a victim's vehicle, to predict its trajectory towards linking messages semantically, e.g., [11], [14], [18], [19].…”
Section: Introductionmentioning
confidence: 99%