Auditable De-anonymization in V2X Communication

Authors

  • Masoud Naderpour Department of Computer Science, University of Helsinki, Finland
  • Tommi Meskanen Department of Computer Science, University of Helsinki, Finland
  • Andrew Paverd Department of Computer Science, Aalto University, Finland
  • Valtteri Niemi Department of Computer Science, University of Helsinki, Finland

DOI:

https://doi.org/10.13052/jicts2245-800X.515

Keywords:

De-anonymization, Auditability, V2X, Security Credential Management System (SCMS)

Abstract

Intelligent transportation systems are on their way toward wide deployment. Vehicle to everything (V2X) communication, as an enabler for safer and more convenient transportation, has attracted growing attention from industry and academia. However, security and privacy concerns of such communication must be addressed before it can be widely adopted. In this paper we analyze the security and privacy requirements of V2X communication. Specifically, we focus on lawful identity resolution (i.e., de-anonymization) in V2X communication, and consider recent regulatory changes in this area. Based on this, we define an expanded set of technical requirements for identity resolution in V2X communication. We then propose a solution for the problem statement where the involved parties may be dishonest but not colluding.

 

Downloads

Download data is not yet available.

Author Biographies

Masoud Naderpour, Department of Computer Science, University of Helsinki, Finland

Masoud Naderpour is currently working as a doctoral student in University of Helsinki, focusing on the security and privacy aspects of 5G mobile systems and cellular-V2X. He holds a master’s degree in information security and cryptography from University of Turku, Finland.

Tommi Meskanen, Department of Computer Science, University of Helsinki, Finland

Tommi Meskanen had his PhD in 2005 in mathematics. He used to work in various positions at the Department of Mathematics in University of Turku from 2000 to 2016. During this time he lectured several cryptography courses. Since 2016 he has been working as a senior researcher at the Department of Computer Science in University of Helsinki.

Andrew Paverd, Department of Computer Science, Aalto University, Finland

Andrew Paverd is a Research Fellow at Aalto University, Finland, and a Deputy Director of the Helsinki-Aalto Center for Information Security. He received his BSc in Electrical Engineering from the University of the Wit-watersrand, Johannesburg, his MSc in Electrical and Computer Engineering from the University of Cape Town, and his DPhil in Computer Science from the University of Oxford. He is a recipient of the 2017–18 Fulbright Cyber Security Scholar Award. His research interests are primarily in the area of systems security and trusted execution environments, and also include the design and analysis of security protocols, distributed consensus mechanisms, and privacy-enhancing technologies.

Valtteri Niemi, Department of Computer Science, University of Helsinki, Finland

Valtteri Niemi is a Professor of Computer Science in University of Helsinki and leads the Secure Systems research group. Earlier he has been a Professor of Mathematics in two other Finnish universities: University of Vaasa during 1993–97 and University of Turku during 2012–2015. Between these two academic positions Niemi served for 15 years in various roles at Nokia Research Center and was nominated as a Nokia Fellow in 2009. At Nokia, Dr. Niemi worked for wireless security, including cryptological aspects and privacy-enhancing technologies. He participated 3GPP SA3 (security) standardization group from its beginning and during 2003–2009 he was the chairman of the group. He has published more than 70 scientific articles and he is a co-author of four books and more than 30 patent families.

References

IEEE guide for wireless access in vehicular environments (WAVE) – architecture. IEEE. doi:10.1109/IEEESTD.2014.6755433

3GPP. (2015). Study on LTE support for Vehicle-to-Everything (V2X) servicese. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/22_series/22.885/

3GPP. (2016). Architecture enhancements for V2X services. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/23_series/23.285/

3GPP. (2016). Study on enhancement of 3GPP support for 5G V2X services. Release 15. Available at: http://www.3gpp.org/ftp/Specs/archive/22_series/22.886/

3GPP. (2017). 3G security; Lawful interception requirements. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/33_series/33.106/

ETSI ES 202 663. (2009). European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band. ETSI Final draft ETSI ES 202 663 V1.1.0.

Bißmeyer, N., Petit, J., and Bayarou, K. M. (2013). CoPRA: Conditional pseudonym resolution algorithm in VANETs. In Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference, 9–16. IEEE.

Bißmeyer, N., Stübing, H., Schoch, E., Götz, S., Stotz, J. P., and Lonc, B. (2011). A generic public key infrastructure for securing car-to-x communication. In 18th ITS World Congress, Orlando, USA, 14.

Fischer, L., Aijaz, A., Eckert, C., and Vogt, D. (2006). Secure Revocable Anonymous Authenticated Inter-vehicle Communication (SRAAC). In 4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany.

Khodaei, M., Jin, H., and Papadimitratos, P. (2014). Towards deploying a scalable & robust vehicular identity and credential management infrastructure. In Vehicular Networking Conference (VNC), 33–40. IEEE.

Crash Avoidance Metrics Partners LLC. (2016). EE Requirements and Specifications Supporting SCMS Software Release 1.1. Technical Report. Available at: http://www.its.dot.gov/pilots/pdf/SCMS_POC_EE_Requirements.pdf

Crash Avoidance Metrics Partners LLC. (2016). SCMS proof-of-concept interfaces. Technical report.

Petit, J., Schaub, F., Feiri, M., and Kargl, F. (2015). Pseudonym Schemes in Vehicular Networks: A Survey. In IEEE communications surveys & tutorials, 17, 228–255.

Schaub, F., Kargl, F., Ma, Z., and Weber, M. (2010). V-tokens for Conditional Pseudonymity in VANETs. In Wireless Communications and Networking Conference (WCNC), 1–6. IEEE.

Titcomb, J., France-Presse, A. (2016). Switzerland will notify citizens when they have been spied on under new surveillance laws, (Accessed: May 15, 2017). Available at: http://www.telegraph.co.uk/technology/2016/09/26/switzerland-will-notify-citizens-when-they-have-been-spied-on-un/

Whyte, W., Weimerskirch, A., Kumar, V., and Hehn, T. (2013). A security credential management system for V2V communications. In Vehicular Networking Conference (VNC),1–8. IEEE.

Downloads

Published

2017-09-15

How to Cite

Naderpour, M. ., Meskanen, T. ., Paverd, A. ., & Niemi, V. (2017). Auditable De-anonymization in V2X Communication. Journal of ICT Standardization, 5(1), 91–106. https://doi.org/10.13052/jicts2245-800X.515

Issue

Section

Articles