Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy Preservation through Uniformity
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. (Networked Systems Security)ORCID iD: 0000-0003-1778-1416
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. (Networked Systems Security)
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems engineering. (Networked Systems Security)ORCID iD: 0000-0002-3267-5374
2018 (English)In: Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., ACM Digital Library, 2018Conference paper, Published paper (Refereed)
Abstract [en]

Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authentication secures communication while enhancing user privacy thanks to a set of anonymized certificates, termed pseudonyms. Vehicles switch the pseudonyms (and the corresponding private key) frequently; we term this pseudonym transition process. However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseudonyms based on the times of pseudonym transition processes. In this poster, we show how one can link pseudonyms of a given vehicle by simply looking at the timing information of pseudonym transition processes. We also propose "mix-zone everywhere": time-aligned pseudonyms are issued for all vehicles to facilitate synchronous pseudonym update; as a result, all vehicles update their pseudonyms simultaneously, thus achieving higher user privacy protection.

Place, publisher, year, edition, pages
ACM Digital Library, 2018.
Keywords [en]
Security and privacy; Pseudonymity, anonymity and untraceability; Privacy-preserving protocols;
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-232022OAI: oai:DiVA.org:kth-232022DiVA, id: diva2:1231577
Conference
ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018.
Note

QC 20180717

Available from: 2018-07-08 Created: 2018-07-08 Last updated: 2018-10-10Bibliographically approved

Open Access in DiVA

fulltext(412 kB)10 downloads
File information
File name FULLTEXT02.pdfFile size 412 kBChecksum SHA-512
efa7705113117f9818260a8733276d5d909fa16a8ef9fd158abef5c26d2f407ba8c2f249dc57f8a3bceefa4eaea2f9a031e3226f4f4a1606f4a55d67ce72b828
Type fulltextMimetype application/pdf

Authority records BETA

Khodaei, MohammadNoroozi, HamidPapadimitratos, Panagiotis

Search in DiVA

By author/editor
Khodaei, MohammadNoroozi, HamidPapadimitratos, Panagiotis
By organisation
Network and Systems engineering
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 28 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 44 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf