Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy Preservation through Uniformity
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. KTH. (Networked Systems Security)ORCID iD: 0000-0003-1778-1416
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. KTH. (Networked Systems Security)
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. KTH. (Networked Systems Security)ORCID iD: 0000-0002-3267-5374
2018 (English)In: Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., ACM Digital Library, 2018Conference paper, Published paper (Refereed)
Abstract [en]

Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authentication secures communication while enhancing user privacy thanks to a set of anonymized certificates, termed pseudonyms. Vehicles switch the pseudonyms (and the corresponding private key) frequently; we term this pseudonym transition process. However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseudonyms based on the times of pseudonym transition processes. In this poster, we show how one can link pseudonyms of a given vehicle by simply looking at the timing information of pseudonym transition processes. We also propose "mix-zone everywhere": time-aligned pseudonyms are issued for all vehicles to facilitate synchronous pseudonym update; as a result, all vehicles update their pseudonyms simultaneously, thus achieving higher user privacy protection.

Place, publisher, year, edition, pages
ACM Digital Library, 2018.
Keywords [en]
Security and privacy; Pseudonymity, anonymity and untraceability; Privacy-preserving protocols;
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-232022OAI: oai:DiVA.org:kth-232022DiVA, id: diva2:1231577
Conference
ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec)
Available from: 2018-07-08 Created: 2018-07-08 Last updated: 2018-07-08

Open Access in DiVA

No full text in DiVA

Search in DiVA

By author/editor
Khodaei, MohammadPapadimitratos, Panos
By organisation
Network and Systems engineering
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 2 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf