ABSTRACT
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop a realistic trust model, and an architecture that supports our solution. In order to ascertain that most users will not find it meaningful to disconnect or disable transponders, we design our solution with several types of user incentives as part of the structure. Examples of resulting features include anonymous toll collection; improved emergency response; and personalized and route-dependent traffic information.
- N. Ben Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based WiFi Deployment Protocols and Security Analysis. In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004. Google ScholarDigital Library
- S. Buchegger and J.-Y. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness in Distributed Ad Hoc Networks. In Proceedings of MobiHOC, 2002. Google ScholarDigital Library
- J. Blum and A. Eskandarian. The Threat of Intelligent Collisions. In IT Professional, 6(1):24-29, Jan.-Feb. 2004. Google ScholarDigital Library
- D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, volume 24, pp. 84--88, Feb. 1981. Google ScholarDigital Library
- Z. Desptovic and K. Aberer. Trust and Reputation in P2P Networks. In 1st Interdisciplinary Symposium on Online Reputation Mechanisms, 2003.Google Scholar
- G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 2--15, May 2003. Google ScholarDigital Library
- S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang. Framework for Security and Privacy in Automotive Telematics. In Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, pp. 25--32, 2002. Google ScholarDigital Library
- Federal Communications Commission. FCC 99-305. FCC Report and Order, October 1999.Google Scholar
- P. Golle, D. Greene, and J. Staddon. Detecting and Correcting Malicious Data in VANETs. In Proceedings of the First ACM Workshop on Vehicular Ad Hoc Networks, pp. 29--37, 2004. Google ScholarDigital Library
- D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Commun. ACM, 42(2):39--41, ACM press, New York, February 1999. Google ScholarDigital Library
- A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, Proactive Public Key and Signature Systems. In ACM Conference on Computer and Communications Security, pp. 100--110, 1997. Google ScholarDigital Library
- J.-P. Hubaux, S. Capkun, and J. Luo. The Security and Privacy of Smart Vehicles. In IEEE SECURITY \& PRIVACY, Vol. 2, No. 3, pp. 49--55, 2004. Google ScholarDigital Library
- D. Houser and J. Wooders. Reputation in Auctions: Theory and Evidence from eBay. Working Paper 00-01, University of Arizona, 2001.Google Scholar
- M. Jakobsson, S. Capkun, and J. P. Hubaux. Secure and Privacy-Preserving Communication in Hybrid Ad hoc Networks. Technical Report IC/2004/10, EPFL-DI-ICA, January 2004.Google Scholar
- M. Jakobsson and M. Yung. Distributed Magic Ink DSS Signatures. In Proceeding of Eurocrypt '97, 1997. Google ScholarDigital Library
- J. Kong and X. Hong. Andor: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks. In Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03), pp. 291--302, 2003. Google ScholarDigital Library
- P. Karger and F. Yair. Security and Privacy Threats to ITS. In The Second World Congress on Intelligent Transport Systems, pp. 2452--2458, November 1995.Google Scholar
- S. Micali. Fair Cryptosystems. In Proceedings of Crypto, 1992.Google Scholar
- P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism to Enforce Node cooperation in Mobile Ad Hoc Networks. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, 2002. Google ScholarDigital Library
- A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5:(2):2--13, 2002.Google Scholar
- M. Raya and J.-P. Hubaux. The Security of Vehicular Networks. In EPFL Technical Report IC/2005/009, 2005.Google Scholar
- M. Raya and J.-P. Hubaux. Security Aspects of Inter-Vehicle Communications. In Swiss Transport Research Conference(STRC) 2005, March 2005.Google Scholar
- ZMT02 M. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security Issues in a Future Vehicular Network. In European Wireless, 2002.Google Scholar
Index Terms
- Balancing auditability and privacy in vehicular networks
Recommendations
Privacy for RFID through trusted computing
WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic societyRadio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. One of the biggest challenges for RFID technology is to provide privacy ...
Balancing Privacy and Safety: Protecting Driver Identity in Naturalistic Driving Video Data
AutomotiveUI '14: Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular ApplicationsNaturalistic driving dataset is at the heart of automotive user interface research, detecting/measuring driver distraction, and many other driver safety related studies. Recent advances in the collection of large scale naturalistic driving data include ...
Examining privacy in vehicular ad-hoc networks
DIVANet '12: Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applicationsIn this paper, we examine privacy implications within vehicular ad-hoc networks, specifically looking at DSRC. By looking at different possible applications for VANETs, we get an idea for the consequences of a privacy breach within VANETs. We examined ...
Comments