Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks

被引:2
|
作者
Desmoulins, Nicolas [1 ]
Diop, Aida [1 ]
Raffle, Yvan [1 ]
Traore, Jacques [1 ]
Gratesac, Josselin [1 ]
机构
[1] Orange Labs, Caen, France
关键词
Direct Anonymous Attestation; Privacy; Security; Trusted Computing; Vehicular Communication Systems;
D O I
10.1109/vnc48660.2019.9062804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular communication systems increase traffic efficiency and safety by allowing vehicles to share safety-related information and location-based services. Pseudonym schemes are the standard solutions providing driver/vehicle anonymity, whilst enforcing vehicle accountability in case of liability issues. State-of-the-art PKI-based pseudonym schemes present scalability issues, notably due to the centralized architecture of certificate-based solutions. The first Direct Anonymous Attestation (DAA)-based pseudonym scheme was introduced at VNC 2017, providing a decentralized approach to the pseudonym generation and update phases. The DAA-based construction leverages the properties of trusted computing, allowing vehicles to autonomously generate their own pseudonyms by using a (resource constrained) Trusted Hardware Module or Component (TC). This proposition however requires the TC to delegate part of the (heavy) pseudonym generation computations to the (more powerful) vehicle's On-Board Unit (OBU), introducing security and privacy issues in case the OBU becomes compromised. In this paper, we introduce a novel pseudonym scheme based on a variant of DAA, namely a pre-DAA-based pseudonym scheme. All secure computations in the pre-DAA pseudonym lifecycle are executed by the secure element, thus creating a secure enclave for pseudonym generation, update, and revocation. We instantiate vehicle-to-everything (V2X) with our pre-DAA solution, thus ensuring user anonymity and user-controlled traceability within the vehicular network. In addition, the pre-DAA-based construction transfers accountability from the vehicle to the user, thus complying with the many-to-many driver/vehicle relation. We demonstrate the efficiency of our solution with a prototype implementation on a standard Javacard (acting as a TC), showing that messages can be anonymously signed and verified in less than 50 ms.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks
    Chen, Cheng-Yeh
    Hsu, Te-Cheng
    Wu, Hsin-Te
    Chiang, John Y.
    Hsieh, Wen-Shyong
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 893 - 902
  • [22] Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks
    Leila Benarous
    Benamar Kadri
    Ahmed Bouridane
    Arabian Journal for Science and Engineering, 2020, 45 : 6033 - 6049
  • [23] Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks
    Benarous, Leila
    Kadri, Benamar
    Bouridane, Ahmed
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (08) : 6033 - 6049
  • [24] SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks
    Boualouache, Abdelwahab
    Soua, Ridha
    Engel, Thomas
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [25] Hash-Based Direct Anonymous Attestation
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600
  • [26] A comprehensive pseudonym changing scheme for improving location in vehicular networks
    Saini, Ikjot
    Saad, Sherif
    Jaekel, Arunita
    INTERNET OF THINGS, 2022, 19
  • [27] Infrastructure-Independent Pseudonym Swap Protocol for Vehicular Networks
    Mdee, Abdueli Paulo
    Khan, Muhammad Toaha Raza
    Seo, Junho
    Kim, Dongkyun
    2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 351 - 356
  • [28] Application of direct anonymous attestation to the Ad Hoc networks security
    Zhang, Tao
    Ren, Shuai
    Journal of Applied Sciences, 2013, 13 (16) : 3320 - 3324
  • [29] Anonymous routing protocol for wireless Ad Hoc networks with synchronized pseudonym
    Liu Jie
    Wang Xiaoming
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 319 - 323
  • [30] An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks
    Xu, Cheng
    Huang, Xiaohong
    Ma, Maode
    Bao, Hong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,