Auditable De-anonymization in V2X Communication
DOI:
https://doi.org/10.13052/jicts2245-800X.515Keywords:
De-anonymization, Auditability, V2X, Security Credential Management System (SCMS)Abstract
Intelligent transportation systems are on their way toward wide deployment. Vehicle to everything (V2X) communication, as an enabler for safer and more convenient transportation, has attracted growing attention from industry and academia. However, security and privacy concerns of such communication must be addressed before it can be widely adopted. In this paper we analyze the security and privacy requirements of V2X communication. Specifically, we focus on lawful identity resolution (i.e., de-anonymization) in V2X communication, and consider recent regulatory changes in this area. Based on this, we define an expanded set of technical requirements for identity resolution in V2X communication. We then propose a solution for the problem statement where the involved parties may be dishonest but not colluding.
Downloads
References
IEEE guide for wireless access in vehicular environments (WAVE) – architecture. IEEE. doi:10.1109/IEEESTD.2014.6755433
3GPP. (2015). Study on LTE support for Vehicle-to-Everything (V2X) servicese. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/22_series/22.885/
3GPP. (2016). Architecture enhancements for V2X services. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/23_series/23.285/
3GPP. (2016). Study on enhancement of 3GPP support for 5G V2X services. Release 15. Available at: http://www.3gpp.org/ftp/Specs/archive/22_series/22.886/
3GPP. (2017). 3G security; Lawful interception requirements. Release 14. Available at: http://www.3gpp.org/ftp/Specs/archive/33_series/33.106/
ETSI ES 202 663. (2009). European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band. ETSI Final draft ETSI ES 202 663 V1.1.0.
Bißmeyer, N., Petit, J., and Bayarou, K. M. (2013). CoPRA: Conditional pseudonym resolution algorithm in VANETs. In Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference, 9–16. IEEE.
Bißmeyer, N., Stübing, H., Schoch, E., Götz, S., Stotz, J. P., and Lonc, B. (2011). A generic public key infrastructure for securing car-to-x communication. In 18th ITS World Congress, Orlando, USA, 14.
Fischer, L., Aijaz, A., Eckert, C., and Vogt, D. (2006). Secure Revocable Anonymous Authenticated Inter-vehicle Communication (SRAAC). In 4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany.
Khodaei, M., Jin, H., and Papadimitratos, P. (2014). Towards deploying a scalable & robust vehicular identity and credential management infrastructure. In Vehicular Networking Conference (VNC), 33–40. IEEE.
Crash Avoidance Metrics Partners LLC. (2016). EE Requirements and Specifications Supporting SCMS Software Release 1.1. Technical Report. Available at: http://www.its.dot.gov/pilots/pdf/SCMS_POC_EE_Requirements.pdf
Crash Avoidance Metrics Partners LLC. (2016). SCMS proof-of-concept interfaces. Technical report.
Petit, J., Schaub, F., Feiri, M., and Kargl, F. (2015). Pseudonym Schemes in Vehicular Networks: A Survey. In IEEE communications surveys & tutorials, 17, 228–255.
Schaub, F., Kargl, F., Ma, Z., and Weber, M. (2010). V-tokens for Conditional Pseudonymity in VANETs. In Wireless Communications and Networking Conference (WCNC), 1–6. IEEE.
Titcomb, J., France-Presse, A. (2016). Switzerland will notify citizens when they have been spied on under new surveillance laws, (Accessed: May 15, 2017). Available at: http://www.telegraph.co.uk/technology/2016/09/26/switzerland-will-notify-citizens-when-they-have-been-spied-on-un/
Whyte, W., Weimerskirch, A., Kumar, V., and Hehn, T. (2013). A security credential management system for V2V communications. In Vehicular Networking Conference (VNC),1–8. IEEE.