2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784924
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Scalability Analysis of Vehicular Combinatorial Certificate Schemes

Abstract: Vehicular networks require secure communication, especially for safety applications. A public key infrastructure using a Combinatorial Certificate Scheme was implemented in the US Vehicle Infrastructure Integration (VII) Proof-ofConcept (PoC) trial to secure V2V communication and preserve vehicle privacy. This paper analyzes the privacy and scalability of the Combinatorial Certificate approach for a nationwide network of 200 million vehicles. It examines the tradeoffs between privacy, the ability to efficientl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 0 publications
0
18
0
Order By: Relevance
“…Thus, our results imply that drivers' privacy would be compromised if any of the two anonymous certificate schemes in [10,11,26] were deployed. The key feature that is exploited by our attacks is the reuse of certificates, suggesting that one-time pseudonyms are necessary to achieve a reasonable level of location privacy.…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations
“…Thus, our results imply that drivers' privacy would be compromised if any of the two anonymous certificate schemes in [10,11,26] were deployed. The key feature that is exploited by our attacks is the reuse of certificates, suggesting that one-time pseudonyms are necessary to achieve a reasonable level of location privacy.…”
Section: Introductionmentioning
confidence: 90%
“…In this work we show that both schemes [10,11,26] fail to prevent the service provider from tracking vehicles and re-identifying their drivers. We present two attacks that exploit the time and location where anonymous certificates are (re-)used.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…4. When a misbehaving vehicle causes certificate c k to be revoked, the CA bisects V(c k ) of size γ into V(c …”
Section: Anonymity Level Of the Proposed Schemementioning
confidence: 99%