Skip to main content

Privacy Endangerment from Protocol Data Sets in VANETs and Countermeasures

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 579))

Abstract

Wireless vehicular networks are about to be deployed within the next years. Important progress towards practical usage of such networks is being made by standardization in Europe and the USA. Thereby, one of the core concerns is privacy of vehicles and their drivers, especially in Europe. Prior work has regarded only a small sub-set of the information exposed by current standards to an attacker for vehicle tracking. Thus, we take a close look on the data contained on different protocol layers of an ETSI ITS system. We find that much data is very distinctive and can be used to identify static vehicle properties such as manufacturer or even model. We call these data sets volatile constant data. Its presence is shown to greatly reduce usability of formerly proposed cooperative pseudonym switching strategies. Thereby, a privacy metric called vehicular uniqueness is introduced. The provided analysis shows that more constraints have to be applied for selecting appropriate cooperation partners for pseudonym switching, which significantly reduces their availability. Therefore, current techniques cannot provide the level of privacy defined in VANET standards. Suggestions for improving the data sets used by security entity and facility layer of ETSI ITS are given to limit the impact of the found issues. Effectiveness of the proposed mechanisms is shown in the provided evaluation.

This is a preview of subscription content, log in via an institution.

References

  1. Intelligent Transport Systems (ITS); Security; Security Services and Architecture, v1.1.1, September 2010

    Google Scholar 

  2. Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe, v 4.0102, June 2011

    Google Scholar 

  3. IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, 1609.2-2013, April 2013

    Google Scholar 

  4. Intelligent Transport Systems (ITS); Facilities layer function; Facility Position and time management, v0.0.2 (2013)

    Google Scholar 

  5. Intelligent Transport Systems (ITS); Security; Security header and certificate formats, v1.1.1, April 2013

    Google Scholar 

  6. C2C-CC Basic System Standards Profile, January 2014

    Google Scholar 

  7. Intelligent Transport Systems (ITS); Users and applications requirements; Part 2: Applications and facilities layer common data dictionary, v1.2.1, September 2014

    Google Scholar 

  8. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, v1.3.2, November 2014

    Google Scholar 

  9. Intelligent Transport Systems (ITS); Security; Security header and certificate formats, v1.2.1, June 2015

    Google Scholar 

  10. Ammoun, S., Nashashibi, F.: Real time trajectory prediction for collision risk estimation between vehicles. In: IEEE 5th International Conference on Intelligent Computer Communication and Processing (2009)

    Google Scholar 

  11. Bissmeyer, N., Stubing, H., Schoch, E., Gotz, S., Stotz, J.P., Lonc, B.: A generic public key infrastructure for securing car-to-X communication. In: 18th ITS World Congress (2011)

    Google Scholar 

  12. Bittl, S., Gonzalez, A.A.: Privacy issues and pitfalls in VANET standards. In: 1st International Conference on Vehicular Intelligent Transport Systems, pp. 144–151, May 2015

    Google Scholar 

  13. Bittl, S., Gonzalez, A.A., Heidrich, W.: Performance comparision of encoding schemes for ETSI ITS C2X communication systems. In: Third International Conference on Advances in Vehicular Systems, Technologies and Applications, pp. 58–63, June 2014

    Google Scholar 

  14. Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening privacy protection in vanets. In: Proceedings of 8th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 508–513 (2008)

    Google Scholar 

  15. Buttyan, L., Holczer, T., Weimerskirch, A., Whyte, W.: Slow: a practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8, October 2009

    Google Scholar 

  16. Eichler, S.: Strategies for pseudonym changes in vehicular Ad hoc networks depending on node mobility. In: IEEE Intelligent Vehicles Symposium, June 2007

    Google Scholar 

  17. Gerlach, M., Güttler, F.: Privacy in VANETs using changing pseudonyms - ideal and real. In: 65th IEEE Vehicular Technology Conference, pp. 2521–2525, April 2007

    Google Scholar 

  18. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking. IEEE Trans. Mob. Comput. 9(8), 1089–1107 (2010)

    Article  Google Scholar 

  19. Houenou, A., Bonnifait, P., Cherfaoui, V., Yao, W.: Vehicle trajectory prediction based on motion model and maneuver recognition. In: IEEE International Conference on Intelligent Robots and Systems, pp. 4363–4369, November 2013

    Google Scholar 

  20. Harding, J., et al.: Vehicle-to-vehicle communications: readiness of V2V technology for application. Technical report DOT HS 812 014, Washington, DC: National Highway Traffic Safety Administration, August 2014

    Google Scholar 

  21. Kraftfahrt-Bundesamt: Neuzulassungen von Personenkraftwagen im August 2014 nach Marken und Modellreihen (2014). http://www.kba.de/DE/Statistik/Fahrzeuge/Neuzulassungen/MonatlicheNeuzulassungen/monatl_neuzulassungen_node.html

  22. Lefévre, S., Petit, J., Bajcsy, R., Laugier, C., Kargl, F.: Impact of V2X privacy strategies on intersection collision avoidance systems. In: IEEE Vehicular Networking Conference, pp. 71–78, December 2013

    Google Scholar 

  23. Nowdehi, N., Olovsson, T.: Experiences from implementing the ETSI ITS securedmessage service. In: IEEE Intelligent Vehicles Symposium, pp. 1055–1060 (2014)

    Google Scholar 

  24. Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutorials 17(1), 228–255 (2015)

    Article  Google Scholar 

  25. Scheuer, F., Plößl, K., Federrath, H.: Preventing profile generation in vehicular networks. In: IEEE WiMob, pp. 520–525 (2008)

    Google Scholar 

  26. Schütze, T.: Automotive security: cryptography for Car2X communication. In: Embedded World Conference, pp. 1–16, March 2011

    Google Scholar 

  27. Stübing, H.: Multilayered Security and Privacy Protection in Car-to-X Networks, 1st edn. Springer, Wiesbaden (2013)

    Book  Google Scholar 

  28. Tomandl, A., Scheuer, F., Federrath, H.: Simulation-based evaluation of techniques for privacy protection in VANETs. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 165–172 (2012)

    Google Scholar 

  29. Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Seventh International Conference on Wireless On-demand Network Systems and Services, pp. 176–183, February 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sebastian Bittl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bittl, S., Gonzalez, A.A. (2015). Privacy Endangerment from Protocol Data Sets in VANETs and Countermeasures. In: Helfert, M., Krempels, KH., Klein, C., Donellan, B., Guiskhin, O. (eds) Smart Cities, Green Technologies, and Intelligent Transport Systems. SMARTGREENS VEHITS 2015 2015. Communications in Computer and Information Science, vol 579. Springer, Cham. https://doi.org/10.1007/978-3-319-27753-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27753-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27752-3

  • Online ISBN: 978-3-319-27753-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics