Skip to main content

Privacy Issues in Vehicular Ad Hoc Networks

  • Conference paper
Book cover Privacy Enhancing Technologies (PET 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3856))

Included in the following conference series:

Abstract

Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private data by authorities, from location profiling and from other attacks on their privacy. On the other hand, system operators and car manufacturers have to be able to identify malfunctioning units for sake of system availability and security. These requirements demand an architecture that can really manage privacy instead of either providing full anonymity or no privacy at all. In this paper we give an overview on the privacy issues in vehicular ad hoc networks from a car manufacturer’s perspective and introduce an exemplary approach to overcome these issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Doetzer, F., Kosch, T., Strassberger, M.: Classification for traffic related inter-vehicle messaging. In: Proceedings of the 5th IEEE International Conference on ITS Telecommunications, Brest, France (2005)

    Google Scholar 

  2. Franz, W., Eberhardt, R., Luckenbach, T.: Fleetnet - internet on the road. In: Proceedings of the 8th World Congress on Intelligent Transportation Systems (2001)

    Google Scholar 

  3. Kosch, T.: Local danger warning based on vehicle ad-hoc networks: Prototype and simulation. In: Proceedings of 1st International Workshop on Intelligent Transportation (WIT 2004) (2004)

    Google Scholar 

  4. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM Press, New York (2004)

    Chapter  Google Scholar 

  5. Dötzer, F., Kohlmayer, F., Kosch, T., Strassberger, M.: Secure communication for intersection assistance. In: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany (2005)

    Google Scholar 

  6. Samfat, D., Molva, R., Asokan, N.: Anonymity and untraceability in mobile networks. In: ACM International Conference on Mobile Computing and Networking (1995)

    Google Scholar 

  7. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in vanets. In: VANET 2004: Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 29–37. ACM Press, New York (2004)

    Chapter  Google Scholar 

  8. Hubaux, J.P., Capkun, S., Luo, J.: Security and privacy of smart vehicles. IEEE Security & Privacy 2, 49–55 (2004)

    Article  Google Scholar 

  9. Jetcheva, J., Hu, Y.C., PalChaudhuri, S., Saha, A., Johnson, D.: Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture. In: Proceedings of the 5th IEEE Workshop on Mobile Computing Systems & Applications, Monterey, CA, USA, pp. 32–43. IEEE, Los Alamitos (2003)

    Google Scholar 

  10. Weimerskirch, A., Westhoff, D.: Zero common-knowledge authentication for pervasive networks. In: Selected Areas in Cryptography, pp. 73–87 (2003)

    Google Scholar 

  11. O’Shea, G., Roe, M.: Child-proof authentication for mipv6 (cam). SIGCOMM Comput. Commun. Rev. 31, 4–8 (2001)

    Article  Google Scholar 

  12. Montenegro, G., Castelluccia, C.: Statistically unique and cryptographically verifiable (sucv) identifiers and addresses. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2002)

    Google Scholar 

  13. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Proceedings of IMA 2001, pp. 360–363. Springer, Heidelberg (2001)

    Google Scholar 

  16. Peredo, G.: Brake-ing news – technologies for inter-vehicle communication (2003)

    Google Scholar 

  17. Sun Microsystems: Java card 2.2 runtime environment specification (2002)

    Google Scholar 

  18. Sun-Microsystems: Java card 2.2 virtual machine specification (2002)

    Google Scholar 

  19. Global Platform: Global platform card specification (version 2.1) (2001)

    Google Scholar 

  20. Dötzer, F.: Aspects of multi-application smart card management systems. Master’s thesis, Technical University Munich (2002)

    Google Scholar 

  21. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  22. Independent Centre for Privacy Protection: First partial success for an.on (2003)

    Google Scholar 

  23. Wright, J., Stepney, S., Clark, J., Jacob, J.: Designing anonymity - a formal basis for identity hiding. Internal yellow report. York University, York (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dötzer, F. (2006). Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds) Privacy Enhancing Technologies. PET 2005. Lecture Notes in Computer Science, vol 3856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767831_13

Download citation

  • DOI: https://doi.org/10.1007/11767831_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34745-3

  • Online ISBN: 978-3-540-34746-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics