A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems
Andreas Messing
amessing@kth.se
1
A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular - - PowerPoint PPT Presentation
A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems Andreas Messing amessing@kth.se 1 Vehicular Communication Systems Smart Cities Self-driving Transportation Systems Vehicle-to-Vehicle
1
2
3
○ Trust between regions
○ Long-Term Certificate
○ Pseudonym issuing
○ Identity Resolution
4
Systems,” in the IEEE TITS, Mar. 2018
○ Computationally costly, inefficient utilization, cumbersome revocation
○ Efficient in utilization & revocation; effective in fending off misbehavior ○ The more frequent interactions, the more dependent on connectivity
5
6
○ No RSUs in range ○ Cellular network overloaded ○ Denial of Service attacks
would “stand out in a crowd”: ○ Different pseudonym signature and timing information
7
1 G. Calandriello et al., “On the Performance of Secure Vehicular Communication Systems,” IEEE TDSC, vol. 8, no. 6, pp. 898–912, Nov. 2011.
○ Lifetime ○ Signature
○ Aligned Lifetimes ○ Same Signer (PCA)
8
9
○ Self-signed Pseudonyms ○ No Syntactic Linking protection
○ Register anonymously with GM
○ Easily obtained information ○ Solved Syntactic Linking based on lifetime
10
randomly decides to use a self-signed pseudonym
self-signed pseudonym in next pseudonym switch
without increasing the probability
11
○ Provided by pseudonyms
○ Group signatures can limit the amount of valid signatures that can be made at the same time ○ Hardware Security Module (HSM) ensures signatures under one private key of a single valid pseudonym
○ Ignoring Rhythm initiation query if VPKI is reachable ○ Rhythm only lasts while the VPKI is out of reach
12
13
14
15
16
17
a. Send public keys + token
18
Systems,” in the IEEE TITS, Mar. 2018
19