Privacy Endangerment from Protocol Data Sets in VANETs and Countermeasures
Abstract
Wireless vehicular networks are about to be deployed within the next years. Important progress towards practical usage of such networks is being made by standardization in Europe and the USA. Thereby, one of the core concerns is privacy of vehicles and their drivers, especially in Europe. Prior work has regarded only a small sub-set of the information exposed by current standards to an attacker for vehicle tracking. Thus, we take a close look on the data contained on different protocol layers of an ETSI ITS system. We find that much data is very distinctive and can be used to identify static vehicle properties such as manufacturer or even model. We call these data sets volatile constant data. Its presence is shown to greatly reduce usability of formerly proposed cooperative pseudonym switching strategies. Thereby, a privacy metric called vehicular uniqueness is introduced. The provided analysis shows that more constraints have to be applied for selecting appropriate cooperation partners for pseudonym switching, which significantly reduces their availability. Therefore, current techniques cannot provide the level of privacy defined in VANET standards. Suggestions for improving the data sets used by security entity and facility layer of ETSI ITS are given to limit the impact of the found issues. Effectiveness of the proposed mechanisms is shown in the provided evaluation.
Keywords
VANET ETSI ITS Privacy SecurityReferences
- 1.Intelligent Transport Systems (ITS); Security; Security Services and Architecture, v1.1.1, September 2010Google Scholar
- 2.Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe, v 4.0102, June 2011Google Scholar
- 3.IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, 1609.2-2013, April 2013Google Scholar
- 4.Intelligent Transport Systems (ITS); Facilities layer function; Facility Position and time management, v0.0.2 (2013)Google Scholar
- 5.Intelligent Transport Systems (ITS); Security; Security header and certificate formats, v1.1.1, April 2013Google Scholar
- 6.C2C-CC Basic System Standards Profile, January 2014Google Scholar
- 7.Intelligent Transport Systems (ITS); Users and applications requirements; Part 2: Applications and facilities layer common data dictionary, v1.2.1, September 2014Google Scholar
- 8.Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, v1.3.2, November 2014Google Scholar
- 9.Intelligent Transport Systems (ITS); Security; Security header and certificate formats, v1.2.1, June 2015Google Scholar
- 10.Ammoun, S., Nashashibi, F.: Real time trajectory prediction for collision risk estimation between vehicles. In: IEEE 5th International Conference on Intelligent Computer Communication and Processing (2009)Google Scholar
- 11.Bissmeyer, N., Stubing, H., Schoch, E., Gotz, S., Stotz, J.P., Lonc, B.: A generic public key infrastructure for securing car-to-X communication. In: 18th ITS World Congress (2011)Google Scholar
- 12.Bittl, S., Gonzalez, A.A.: Privacy issues and pitfalls in VANET standards. In: 1st International Conference on Vehicular Intelligent Transport Systems, pp. 144–151, May 2015Google Scholar
- 13.Bittl, S., Gonzalez, A.A., Heidrich, W.: Performance comparision of encoding schemes for ETSI ITS C2X communication systems. In: Third International Conference on Advances in Vehicular Systems, Technologies and Applications, pp. 58–63, June 2014Google Scholar
- 14.Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening privacy protection in vanets. In: Proceedings of 8th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 508–513 (2008)Google Scholar
- 15.Buttyan, L., Holczer, T., Weimerskirch, A., Whyte, W.: Slow: a practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8, October 2009Google Scholar
- 16.Eichler, S.: Strategies for pseudonym changes in vehicular Ad hoc networks depending on node mobility. In: IEEE Intelligent Vehicles Symposium, June 2007Google Scholar
- 17.Gerlach, M., Güttler, F.: Privacy in VANETs using changing pseudonyms - ideal and real. In: 65th IEEE Vehicular Technology Conference, pp. 2521–2525, April 2007Google Scholar
- 18.Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking. IEEE Trans. Mob. Comput. 9(8), 1089–1107 (2010)CrossRefGoogle Scholar
- 19.Houenou, A., Bonnifait, P., Cherfaoui, V., Yao, W.: Vehicle trajectory prediction based on motion model and maneuver recognition. In: IEEE International Conference on Intelligent Robots and Systems, pp. 4363–4369, November 2013Google Scholar
- 20.Harding, J., et al.: Vehicle-to-vehicle communications: readiness of V2V technology for application. Technical report DOT HS 812 014, Washington, DC: National Highway Traffic Safety Administration, August 2014Google Scholar
- 21.Kraftfahrt-Bundesamt: Neuzulassungen von Personenkraftwagen im August 2014 nach Marken und Modellreihen (2014). http://www.kba.de/DE/Statistik/Fahrzeuge/Neuzulassungen/MonatlicheNeuzulassungen/monatl_neuzulassungen_node.html
- 22.Lefévre, S., Petit, J., Bajcsy, R., Laugier, C., Kargl, F.: Impact of V2X privacy strategies on intersection collision avoidance systems. In: IEEE Vehicular Networking Conference, pp. 71–78, December 2013Google Scholar
- 23.Nowdehi, N., Olovsson, T.: Experiences from implementing the ETSI ITS securedmessage service. In: IEEE Intelligent Vehicles Symposium, pp. 1055–1060 (2014)Google Scholar
- 24.Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutorials 17(1), 228–255 (2015)CrossRefGoogle Scholar
- 25.Scheuer, F., Plößl, K., Federrath, H.: Preventing profile generation in vehicular networks. In: IEEE WiMob, pp. 520–525 (2008)Google Scholar
- 26.Schütze, T.: Automotive security: cryptography for Car2X communication. In: Embedded World Conference, pp. 1–16, March 2011Google Scholar
- 27.Stübing, H.: Multilayered Security and Privacy Protection in Car-to-X Networks, 1st edn. Springer, Wiesbaden (2013)CrossRefGoogle Scholar
- 28.Tomandl, A., Scheuer, F., Federrath, H.: Simulation-based evaluation of techniques for privacy protection in VANETs. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 165–172 (2012)Google Scholar
- 29.Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Seventh International Conference on Wireless On-demand Network Systems and Services, pp. 176–183, February 2010Google Scholar
Copyright information
Open Access This chapter is distributed under the terms of the Creative Commons Attribution Noncommercial License, which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.