• search hit 2 of 2
Back to Result List

Misuse Capabilities of the V2V Communication to Harm the Privacy of Vehicles and Drivers

  • A deployment of the Vehicle-2-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a policy for a necessary Public Key Infrastructure to enrol cryptographic keys and certificates for vehicles and infrastructure component is in discussion to enable an interoperable Vehicle-2-Vehicle communication. Vehicle-2-Vehicle communication means that vehicles periodically send Cooperative Awareness Messages. These messages contain the current geographic position, driving direction, speed, acceleration, and the current time of a vehicle. To protect privacy (location privacy, “speed privacy”) of vehicles and drivers ETSI provides a specific pseudonym concept. We show that the Vehicle-2-Vehicle communication can be misused by an attacker to plot a trace of sequent Cooperative Awareness Messages and to link this trace to a specific vehicle. Such a trace is non-disputable due to the cryptographic signing of the messages. So, the periodically sending of Cooperative Awareness Messages causes privacy problems even if the pseudonym concept is applied.

Export metadata

Additional Services

Share in Twitter Search Google Scholar Availability
Metadaten
Document Type:Article
Language:English
Parent Title (English):International Journal on Advances in Networks and Services
Volume:10
Issue:1&2
First Page:35
Last Page:43
ISSN:1942-2644
URL:http://www.thinkmind.org/index.php?view=article&articleid=netser_v10_n12_2017_4
Publisher:ThinkMind
Date of first publication:2017/06/30
Tag:Cooperative Awareness Message; Intelligent Transport System; Privacy; Pseudonym Concept; Vehicle-2-Vehicle Communication; Vehicular Ad hoc Networks
Departments, institutes and facilities:Fachbereich Informatik
Institut für Sicherheitsforschung (ISF)
Dewey Decimal Classification (DDC):000 Informatik, Informationswissenschaft, allgemeine Werke / 000 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Entry in this database:2017/08/05