Abstract
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private data by authorities, from location profiling and from other attacks on their privacy. On the other hand, system operators and car manufacturers have to be able to identify malfunctioning units for sake of system availability and security. These requirements demand an architecture that can really manage privacy instead of either providing full anonymity or no privacy at all. In this paper we give an overview on the privacy issues in vehicular ad hoc networks from a car manufacturer’s perspective and introduce an exemplary approach to overcome these issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Doetzer, F., Kosch, T., Strassberger, M.: Classification for traffic related inter-vehicle messaging. In: Proceedings of the 5th IEEE International Conference on ITS Telecommunications, Brest, France (2005)
Franz, W., Eberhardt, R., Luckenbach, T.: Fleetnet - internet on the road. In: Proceedings of the 8th World Congress on Intelligent Transportation Systems (2001)
Kosch, T.: Local danger warning based on vehicle ad-hoc networks: Prototype and simulation. In: Proceedings of 1st International Workshop on Intelligent Transportation (WIT 2004) (2004)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM Press, New York (2004)
Dötzer, F., Kohlmayer, F., Kosch, T., Strassberger, M.: Secure communication for intersection assistance. In: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany (2005)
Samfat, D., Molva, R., Asokan, N.: Anonymity and untraceability in mobile networks. In: ACM International Conference on Mobile Computing and Networking (1995)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in vanets. In: VANET 2004: Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 29–37. ACM Press, New York (2004)
Hubaux, J.P., Capkun, S., Luo, J.: Security and privacy of smart vehicles. IEEE Security & Privacy 2, 49–55 (2004)
Jetcheva, J., Hu, Y.C., PalChaudhuri, S., Saha, A., Johnson, D.: Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture. In: Proceedings of the 5th IEEE Workshop on Mobile Computing Systems & Applications, Monterey, CA, USA, pp. 32–43. IEEE, Los Alamitos (2003)
Weimerskirch, A., Westhoff, D.: Zero common-knowledge authentication for pervasive networks. In: Selected Areas in Cryptography, pp. 73–87 (2003)
O’Shea, G., Roe, M.: Child-proof authentication for mipv6 (cam). SIGCOMM Comput. Commun. Rev. 31, 4–8 (2001)
Montenegro, G., Castelluccia, C.: Statistically unique and cryptographically verifiable (sucv) identifiers and addresses. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2002)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Proceedings of IMA 2001, pp. 360–363. Springer, Heidelberg (2001)
Peredo, G.: Brake-ing news – technologies for inter-vehicle communication (2003)
Sun Microsystems: Java card 2.2 runtime environment specification (2002)
Sun-Microsystems: Java card 2.2 virtual machine specification (2002)
Global Platform: Global platform card specification (version 2.1) (2001)
Dötzer, F.: Aspects of multi-application smart card management systems. Master’s thesis, Technical University Munich (2002)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Independent Centre for Privacy Protection: First partial success for an.on (2003)
Wright, J., Stepney, S., Clark, J., Jacob, J.: Designing anonymity - a formal basis for identity hiding. Internal yellow report. York University, York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dötzer, F. (2006). Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds) Privacy Enhancing Technologies. PET 2005. Lecture Notes in Computer Science, vol 3856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767831_13
Download citation
DOI: https://doi.org/10.1007/11767831_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34745-3
Online ISBN: 978-3-540-34746-0
eBook Packages: Computer ScienceComputer Science (R0)