Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2009
A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative awareness. Privacy issues arise from the frequent broadcasting of real-time positioning information. Thus privacy protection becomes a key factor for enabling widespread deployment. At the same time, stakeholders demand accountability due to the safety-critical nature of many applications. Earlier works on privacy requirements for vehicular networks often discussed them as a part of security. Therefore many aspects of privacy requirements have been overlooked. In this paper, we identify a structured and comprehensive set of privacyrelated requirements for vehicular communication systems, and analyze the complex inter-relations among them. Our results enable system designers to better understand privacy issues in vehicular networks and properly address privacy requirements during the system design process. We further show that our requirements set facilitates the comparison and evaluation of different privacy approaches for vehicular communication systems.
2009
Vehicular ad hoc networks (VANETs) will improve traffic safety and efficiency provided that car-to-car communication stays trustworthy. Therefore, it is crucial to ensure that the information conveyed by vehicle-generated messages is reliable. A sensible option is to request that the content of a message originated by a certain vehicle be endorsed by nearby peer vehicles. However, neither message generation nor message endorsement should entail any privacy loss on the part of vehicles co-operating in it. This chapter surveys the available solutions to this security-privacy tension and analyzes their limitations. A new privacy-preserving system is sketched which guarantees message authentication through both a priori and a posteriori countermeasures.
Privacy Enhancing Technologies, 2006
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private data by authorities, from location profiling and from other attacks on their privacy. On the other hand, system operators and car manufacturers have to be able to identify malfunctioning units for sake of system availability and security. These requirements demand an architecture that can really manage privacy instead of either providing full anonymity or no privacy at all. In this paper we give an overview on the privacy issues in vehicular ad hoc networks from a car manufacturer's perspective and introduce an exemplary approach to overcome these issues.
Location Privacy in VANETs, 2019
Recent advancements in embedded technologies, pervasive computing, and ubiquitous connectivity have revolutionized our daily lives, making them safe, efficient and convenient as never before. These evolving technologies have not only transformed our workplaces but are also reshaping our living habits, including the way we communicate, travel, learn, and relax. In the field of transportation alone, a huge influx of highly-connected, situation-aware and even self-driving vehicles has been observed recently, thus revamping existing automobiles into smarter, automated and safer vehicular networks. This exponential rise in vehicular connectivity has introduced new terminologies such as Vehicular Ad-hoc NETworks (VANETs) and the Internet of Vehicles (IoV), aiming towards road-safety, smart traffic management, and real-time information/incident sharing. However, these highly-connected vehicles have also introduced several novel security and safety threats both to the hosts and associated assets, inducing serious even life-threatening consequences. Compromise of location privacy and vehicular identity is one of such serious threats, which may be exploited by an adversary to launch sophisticated attacks including stalking, identity theft/manipulation or even tracking and sabotaging of VIP moves. Such threat vectors primarily exploit subtle vulnerabilities in resource-constrained communication protocols being deployed for vehicular connectivity as well as improper security configurations of associated systems. The threats can be countered by placement of robust network security techniques suiting the VANET environment. This survey paper aims to probe into these vulnerabilities of vehicular networks, classify associated security and safety threats, and ultimately asses various countermeasures to safeguard against privacy-breach situations. Besides presenting a holistic overview of emerging threats in vehicular networks, the paper critically analyzes some of the recent approaches (2008-2018) to safeguard against location privacy threats with reference to a range of operational and security considerations.
2006
The emerging technology of vehicular communications (VC) raises a number of technical problems that need to be addressed. Among those, security and privacy concerns are paramount for the wide adoption of VC. In this position paper, we are concerned with privacy and identity management in the context of these systems. We identify VC-specific issues and challenges, considering the salient features of these systems. In particular, we view them in the context of other broader privacy protection efforts, as well as in the light of on-going work for VC standardization, and other mobile wireless communication technologies. 1
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
The primary aim of Vehicular Ad hoc NETworks (VANET) is to enhance traffic safety by enabling frequent broadcasting of location information between vehicles. In VANET safety applications, a vehicle requires to broadcast messages, which usually contain its location information, every (1-10 Hz) with other vehicles in its communication area (300m) to facilitate cooperative awareness. This would arise privacy issues because vehicles are vulnerable to tracking attacks via their locations. To prevent long-term linking, many privacy schemes have adopted a silent period in which a vehicle stops sharing its locations for a period. However, silent periods could have a negative impact on safety applications as an accident could have happened if a vehicle stop sharing its locations with other neighbours. Thus, in this paper, we first discuss three privacy schemes (RSP, SLOW and CAPS), which adopted silent periods but in different concepts. Then, we improve the privacy and safety level of CAPS. ...
2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008
In the not so far future, vehicles are expected to be able to communicate with each other and with the road infrastructure, to enhance driving experience and support road safety, among others. Vehicular Ad-hoc Networks (VANETs) introduce a number of security challenges to the research community, mainly concerning the tradeoff between the privacy of the drivers and the accountability of misbehaving vehicles. Another challenge is how to satisfy privacy in the presence of an adversary that has access to all communication (a global observer), and that can perform traffic analysis in order to link messages and identify vehicles. In this paper we attempt to address such issues and propose a set of cryptographic mechanisms that balance the tradeoff between privacy and accountability in a VANET. Furthermore, we examine techniques for location privacy against adversaries that perform a Bayesian traffic analysis, and propose a strategy to strengthen location privacy in VANETs.
It is well established now within the vehicular Communication (VC) community the fact that security and protection of privacy are a prerequisite for the deployment of the technology. It is also understood that without the integration of strong and practical security and privacy enhancing mechanisms, VC systems could be disrupted or disabled, even by relatively unsophisticated attackers.
MDPI Sensors, 2019
Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase all over the world. One of the most significant enablers for ITS are vehicle positioning and tracking techniques. Worldwide integration of ITS employing Dedicated Short Range Communications (DSRC) and European standard for vehicular communication, known as ETSI ITS-G5, brings a variety of options to improve the positioning in areas where GPS connectivity is lacking precision. Utilization of the ready infrastructure, next-generation cellular 5G networks, and surrounding electronic devices together with conventional positioning techniques could become the solution to improve the overall ITS operation in vehicle-to-everything (V2X) communication scenario. Nonetheless, effective and secure communication protocols between the vehicle and roadside units should be both analyzed and improved in terms of potential attacks on the transmitted positioning-related data. In particular, said information might be misused or stolen at the infrastructure side conventionally assumed to be trusted. In this paper, we first survey different methods of vehicle positioning, which is followed by an overview of potential attacks on ITS systems. Next, we propose potential improvements allowing mutual authentication between the vehicle and infrastructure aiming at improving positioning data privacy. Finally, we propose a vision on the development and standardization aspects of such systems.
Ad Hoc Networks, 2011
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement (with security analysis) and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques (through simulation study). We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.
IEEE Communications Magazine, 2008
Significant developments have taken place over the past few years in the area of vehicular communication (VC) systems. Now, it is well understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so, precisely because the benefits of VC systems, with the mission to enhance transportation safety and efficiency, are at stake. Without the integration of strong and practical security and privacy enhancing mechanisms, VC systems could be disrupted or disabled, even by relatively unsophisticated attackers. We address this problem within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution. We present our results in a set of two papers in this issue. In this first one, we analyze threats and types of adversaries, we identify security and privacy requirements, and we present a spectrum of mechanisms to secure VC systems. We provide a solution that can be quickly adopted and deployed. In the second paper, we present our progress towards the implementation of our architecture and results on the performance of the secure VC system, along with a discussion of upcoming research challenges and our related current results.
Future Internet
A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control and real-time information, event allocation. VANETs have received attention in support of safe driving, intelligent navigation, emergency and entertainment applications in vehicles. Nevertheless, these increasingly linked vehicles pose a range of new safety and security risks to both the host and its associated properties and may even have fatal consequences. Violations of national privacy and vehicle identities are a major obstacle to introducing forced contact protocols in vehicles. Location privacy refers to the privacy of the vehicle (driver) and the location of the vehicle. Whenever a vehicle sends a message, no one but authorized entities should know their real identity and location of the vehicle. All the messages sent by the vehic...
The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users.
In the near future, most new vehicles will be equipped with shortrange radios capable of communicating with other vehicles or with highway infrastructure at distances of at least one kilometer. The radios will allow new applications that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the car ahead abruptly brakes. While resembling traditional sensor and ad hoc networks in some respects, vehicular networks pose a number of unique challenges. For example, the information conveyed over a vehicular network may affect life-or-death decisions, making fail-safe security a necessity. However, providing strong security in vehicular networks raises important privacy concerns that must also be considered. To address these challenges, we propose a set of security primitives that can be used as the building blocks of secure applications. The deployment of vehicular networks is rapidly approaching, and their success and safety will depend on viable security solutions acceptable to consumers, manufacturers and governments.
2007
The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. In this paper, we propose a security architecture for VC. The primary objectives of the architecture include the management of identities and cryptographic keys, the security of communications, and the integration of privacy enhancing technologies. Our design approach aims at a system that relies on well-understood components which can be upgraded to provide enhanced security and privacy protection in the future. This effort is undertaken by SeVeCom (http://www.sevecom.org), a transversal project providing security and privacy enhancing mechanisms compatible with the VC technologies currently under development by all EU funded projects.
International Journal of Grid and High Performance Computing, 2010
This paper proposes a mechanism for sustaining privacy of a vehicle in a vehicular ad hoc network (VANET) through pseudonym update. In a VANET, vehicles on the road are involved in dissemination of information as they move. An association can be formed between the physical location of the source vehicle and the transmitted messages. This relationship between the physical vehicle and its identity can breach its privacy. In this work, a strategy for optimal pseudonym update for maximizing privacy has been formulated when a vehicle is being observed by adversaries with different capabilities. Results indicate that updating pseudonyms in accordance to the strategy maximizes the privacy of a vehicle in the given situation.
AbstrAct Over the past few decades, the technologies of mobile communication, positioning, and computing have gradually converged. The automobile has been a natural platform for this convergence where satellite-based positioning, wireless communication and on-board computing work in tandem offering various services to motorists. While there are many opportunities with these novel services, significant risks to the location privacy of motorists also exist as a result of the fast-paced technological evolution. These risks must be confronted if trust and confidence are to prevail between motorists and service providers. This chapter provides an overview of the current situation of location privacy in automotive telematics by exploring possible abuses and existing approaches to curb these abuses followed by a discussion of possible privacy-strengthening measures. Location Privacy in Automotive Telematics
2008
Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the research community. In this paper we overview the main privacy concepts and explain why these are fundamental for wide adoption of VANETs. Then, a set of privacy requirements for VANETs is established and studied towards proposing a novel mechanism beyond the use of pseudonyms. In particular, this research demonstrates that there are still several challenges concerning privacy, which solution is feasible to be extrapolated from highlydemanding environments like e-Health. Finally this paper reports our work mainly describing the basis of a privacy mechanism that uses an authorization paradigm based on a Mandatory Access Control model and, a novel architecture that propagates trust information based on a vehicle's geolocation.
IAEME PUBLICATION, 2024
With the increasing number of laud self-driving cars on the roads, these cars are expected to be fitted with sensors and cameras, as well as communication interfaces to share information in order to better co-ordinate themselves, and avoid traffic accidents. However, integrating of self-driving cars in networks also entails great risks to privacy and security. The goal of this study would be to evaluate the privacy and cybersecurity concerns related to the connected car systems, and offer recommendations for ethical big data management, as well as technological and regulatory measures. Areas that would require focus would be on the data acquisition policies, risk of cyber threats including hacking and ransom ware, the choice of privacy preserving technologies and frameworks, the legal regime and issues of liability, and policies on disclosure of vulnerabilities if any. Privacy, especially personal privacy, and system security will be vital to gain users’ trust and thus popularize this new technology that holds the potential to revolutionize transportation operations by enhancing mobility, productivity, and safety. Such recommendations are useful for furthering the industry and government practice to incorporate autonomous vehicle infrastructure while ensuring adequate measures for security are put in place.
SSRN Electronic Journal, 2018
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise many challenges where the security and privacy concerns are the most critical ones. In this paper, we provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper. Besides that, a classification of the various VANET attacks based on the communication system layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers arepresented here.In general, this paper aims to provide a good piece of information about VANET security and privacy, in order to be used as a tool to help researchers in this field in developing secure privacy-preserving approaches for VANET.
Applied Sciences, 2019
With the deployment of Vehicular Ad hoc Networks (VANETs), new transport safety and efficiency applications are emerging. One of the fields where the adoption of information and communication technologies (ICT) is expected to bring great benefits, is emergency systems. A properly designed emergency vehicle warning system should provide car drivers with adequate reaction times and additional information, complementing the currently used lights and sirens. The objective is to increase road safety and to create conditions for a fast and reliable movement of emergency vehicles (EVs). The available literature addressing privacy issues in VANET-based emergency vehicle warning systems is strongly limited. In this paper, the privacy ensuring emergency vehicle approaching warning system (PEEV-WS) is proposed based on a requirements analysis. Privacy is ensured by avoiding transmissions of sensitive information (e.g., expected EV route) over the wireless channel. This is achieved by assigning...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.