2014 IEEE Vehicular Networking Conference (VNC) 2014
DOI: 10.1109/vnc.2014.7013305
|View full text |Cite
|
Sign up to set email alerts
|

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)

Abstract: Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to revocation puts the users' privacy at risk if the backend systems are not fully trusted.We propose PUCA -a scheme that provides full anonymity, even against colluding backend providers, until the owner of a vehicle tri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
37
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(38 citation statements)
references
References 19 publications
1
37
0
Order By: Relevance
“…This section explores which requirements are present for each one. Tables 3 and 4 summarize [17,19,20,43,48]. One important remark is that most of them are the same than the identified ABC features.…”
Section: Privacy Requirements Per Use Casementioning
confidence: 90%
See 2 more Smart Citations
“…This section explores which requirements are present for each one. Tables 3 and 4 summarize [17,19,20,43,48]. One important remark is that most of them are the same than the identified ABC features.…”
Section: Privacy Requirements Per Use Casementioning
confidence: 90%
“…The system is described but specifications regarding credentials management are not provided. More recently, PUCA, a pseudonym scheme with user-controlled anonymity for VANETs is presented [20]. Anonymous credentials are used for authentication purposes in car-to-X communications applying Camenisch et al approach [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The key requirement for the effectiveness of pseudonyms is their unlinkability for attackers, while authorities may have the ability to resolve pseudonymous identities to the owner of a vehicle. Depending on this effectiveness, this kind of pseudonymous authentication scheme can offer revocable privacy [123] or even reasonable levels of true anonymity [54] However, important details remain underspecified and subject to research. The biggest open question concerns the strategy for pseudonym changes, which has a large influence on the effectiveness of pseudonyms.…”
Section: Achievable Privacymentioning
confidence: 99%
“…In [53] it is suggested to insert attributed based authentication into the V2V broadcast authentication domain at the pseudonym issuance stage. This can effectively weaken revocable privacy, which enhances anonymity, and avoids the performance penalties of using attributed based cryptography by continuing to use pseudonymous certification for the V2V broadcast.…”
Section: Related Workmentioning
confidence: 99%