Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks 2019
DOI: 10.1145/3317549.3323410
|View full text |Cite
|
Sign up to set email alerts
|

Scaling pseudonymous authentication for large mobile systems

Abstract: The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used to ensure message authenticity and integrity while preserving vehicle (thus passenger) privacy. In the light of emerging largescale multi-domain VC environments, the efficiency of the VPKI and, more broadly, its scalability are paramount. By the same token, prev… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 52 publications
(112 reference statements)
0
9
0
Order By: Relevance
“…Beyond vehicle sharing security and privacy, vehicular communications security and privacy received extensive attention over the years [46], [87], [88]. Recent results focus, for example, on scalable systems, notably for credential management [46], [89], [90], pseudonymous certificates for vehicle tracking protection [91], and decentralized cooperative defenses [92], [93]. Moreover, Qi et al [94] proposed an enhanced scheme of [95], namely, DUBI, a decentralized and privacy-preserving usage-based insurance scheme built on the blockchain technology to address privacy concerns for pay-asyou-drive insurances using zero-knowledge proofs and smart contracts.…”
Section: Related Workmentioning
confidence: 99%
“…Beyond vehicle sharing security and privacy, vehicular communications security and privacy received extensive attention over the years [46], [87], [88]. Recent results focus, for example, on scalable systems, notably for credential management [46], [89], [90], pseudonymous certificates for vehicle tracking protection [91], and decentralized cooperative defenses [92], [93]. Moreover, Qi et al [94] proposed an enhanced scheme of [95], namely, DUBI, a decentralized and privacy-preserving usage-based insurance scheme built on the blockchain technology to address privacy concerns for pay-asyou-drive insurances using zero-knowledge proofs and smart contracts.…”
Section: Related Workmentioning
confidence: 99%
“…Preliminary assumptions: We leverage a state-of-the-art VPKI system [43], [54], [55] that provides pseudonyms in an on-demand fashion: each vehicle ''decides'' when to trigger the pseudonym acquisition process based on various factors [56], [57]. Such a scheme requires sparse connectivity to the VPKI, but it facilitates an OBU to be preloaded with pseudonyms proactively, covering a longer period, e.g., a week or a month, should the connectivity be expected heavily intermittent.…”
Section: Motivation and Overviewmentioning
confidence: 99%
“…Such a scheme requires sparse connectivity to the VPKI, but it facilitates an OBU to be preloaded with pseudonyms proactively, covering a longer period, e.g., a week or a month, should the connectivity be expected heavily intermittent. The efficiency, scalability and robustness of the VPKI system is systematically investigated [43], [54], [55], [56] with the VPKI handles a large workload. Moreover, it enhances user privacy, notably preventing linking pseudonyms based on timing information [38] (the instance of issuance and the pseudonym lifetime) as well as offers strong user privacy protection even in the presence of honest-but-curious VPKI entities.…”
Section: Motivation and Overviewmentioning
confidence: 99%
“…Our scheme requires sparse connectivity to the VPKI, allowing an OBU to be preloaded with numerous pseudonyms proactively, covering a longer period, e.g., a week or a month (should the connectivity be relatively scarce). We assume that a state-of-the-art VPKIs, e.g., [7], [8], [75], can provide pseudonyms in a timely manner. Moreover, we assume the VPKI pseudonym lifetime policy is the same for all registered vehicles, so that timing information does not harm user privacy [8], [20].…”
Section: A System Model and Assumptionsmentioning
confidence: 99%