Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks

被引:2
|
作者
Desmoulins, Nicolas [1 ]
Diop, Aida [1 ]
Raffle, Yvan [1 ]
Traore, Jacques [1 ]
Gratesac, Josselin [1 ]
机构
[1] Orange Labs, Caen, France
关键词
Direct Anonymous Attestation; Privacy; Security; Trusted Computing; Vehicular Communication Systems;
D O I
10.1109/vnc48660.2019.9062804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular communication systems increase traffic efficiency and safety by allowing vehicles to share safety-related information and location-based services. Pseudonym schemes are the standard solutions providing driver/vehicle anonymity, whilst enforcing vehicle accountability in case of liability issues. State-of-the-art PKI-based pseudonym schemes present scalability issues, notably due to the centralized architecture of certificate-based solutions. The first Direct Anonymous Attestation (DAA)-based pseudonym scheme was introduced at VNC 2017, providing a decentralized approach to the pseudonym generation and update phases. The DAA-based construction leverages the properties of trusted computing, allowing vehicles to autonomously generate their own pseudonyms by using a (resource constrained) Trusted Hardware Module or Component (TC). This proposition however requires the TC to delegate part of the (heavy) pseudonym generation computations to the (more powerful) vehicle's On-Board Unit (OBU), introducing security and privacy issues in case the OBU becomes compromised. In this paper, we introduce a novel pseudonym scheme based on a variant of DAA, namely a pre-DAA-based pseudonym scheme. All secure computations in the pre-DAA pseudonym lifecycle are executed by the secure element, thus creating a secure enclave for pseudonym generation, update, and revocation. We instantiate vehicle-to-everything (V2X) with our pre-DAA solution, thus ensuring user anonymity and user-controlled traceability within the vehicular network. In addition, the pre-DAA-based construction transfers accountability from the vehicle to the user, thus complying with the many-to-many driver/vehicle relation. We demonstrate the efficiency of our solution with a prototype implementation on a standard Javacard (acting as a TC), showing that messages can be anonymously signed and verified in less than 50 ms.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Balusamy, Balamurugan
    Shynu, P. G.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 943 - 955
  • [32] Anonymous and Lightweight Authentication for Secure Vehicular Networks
    Ying, Bidi
    Nayak, Amiya
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (12) : 10626 - 10636
  • [33] Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
    Xi, Yong
    Sha, Ke-Wei
    Shi, Wei-Song
    Schwiebert, Loren
    Zhang, Tao
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (06) : 916 - 928
  • [34] Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
    习勇
    沙科伟
    施巍松
    Loren Schwiebert
    张涛
    Journal of Computer Science & Technology, 2008, (06) : 916 - 928
  • [35] Anonymous remote attestation protocol based on DAA and TLS
    Zhang, Dawei (dwzhang@bjtu.edu.cn), 1600, Huazhong University of Science and Technology (42):
  • [36] Anonymous routing protocol for wireless Ad Hoc networks with synchronized pseudonym
    Liu Jie
    Wang Xiaoming
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VIII, 2010, : 319 - 323
  • [37] Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
    Yong Xi
    Ke-Wei Sha
    Wei-Song Shi
    Loren Schwiebert
    Tao Zhang
    Journal of Computer Science and Technology, 2008, 23 : 916 - 928
  • [38] A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks
    Boualouache, Abdelwahab
    Senouci, Sidi-Mohammed
    Moussaoui, Samira
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 770 - 790
  • [39] A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
    Artail, Hassan
    Abbani, Noor
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) : 106 - 119
  • [40] Trajectory-Based Data Forwarding Schemes for Vehicular Networks
    Jaehoon (Paul) Jeong
    Tian He
    David H.C.Du
    ZTE Communications, 2014, 12 (01) : 17 - 25