Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks

被引:2
|
作者
Desmoulins, Nicolas [1 ]
Diop, Aida [1 ]
Raffle, Yvan [1 ]
Traore, Jacques [1 ]
Gratesac, Josselin [1 ]
机构
[1] Orange Labs, Caen, France
关键词
Direct Anonymous Attestation; Privacy; Security; Trusted Computing; Vehicular Communication Systems;
D O I
10.1109/vnc48660.2019.9062804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular communication systems increase traffic efficiency and safety by allowing vehicles to share safety-related information and location-based services. Pseudonym schemes are the standard solutions providing driver/vehicle anonymity, whilst enforcing vehicle accountability in case of liability issues. State-of-the-art PKI-based pseudonym schemes present scalability issues, notably due to the centralized architecture of certificate-based solutions. The first Direct Anonymous Attestation (DAA)-based pseudonym scheme was introduced at VNC 2017, providing a decentralized approach to the pseudonym generation and update phases. The DAA-based construction leverages the properties of trusted computing, allowing vehicles to autonomously generate their own pseudonyms by using a (resource constrained) Trusted Hardware Module or Component (TC). This proposition however requires the TC to delegate part of the (heavy) pseudonym generation computations to the (more powerful) vehicle's On-Board Unit (OBU), introducing security and privacy issues in case the OBU becomes compromised. In this paper, we introduce a novel pseudonym scheme based on a variant of DAA, namely a pre-DAA-based pseudonym scheme. All secure computations in the pre-DAA pseudonym lifecycle are executed by the secure element, thus creating a secure enclave for pseudonym generation, update, and revocation. We instantiate vehicle-to-everything (V2X) with our pre-DAA solution, thus ensuring user anonymity and user-controlled traceability within the vehicular network. In addition, the pre-DAA-based construction transfers accountability from the vehicle to the user, thus complying with the many-to-many driver/vehicle relation. We demonstrate the efficiency of our solution with a prototype implementation on a standard Javacard (acting as a TC), showing that messages can be anonymously signed and verified in less than 50 ms.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Pseudonym generation using genetic algorithm in vehicular ad hoc networks
    Chaudhary, Bhawna
    Singh, Karan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 661 - 677
  • [42] An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks
    Kouicem, Djamel-Eddine
    Bouabdallah, Abdelmadjid
    Lakhlef, Hicham
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 308 - 313
  • [43] Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
    Li, Longjiang
    Mao, Yuming
    Li, Yonggang
    Yuan, Yinxia
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) : 2349 - 2359
  • [44] Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
    Longjiang Li
    Yuming Mao
    Yonggang Li
    Yinxia Yuan
    Wireless Personal Communications, 2013, 71 : 2349 - 2359
  • [45] Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks
    Li, Ming
    Weng, Jian
    Yang, Anjia
    Liu, Jia-Nan
    Lin, Xiaodong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) : 11248 - 11259
  • [46] Blockchain-Based Pseudonym Management Scheme for Vehicular Communication
    George, Sonia Alice
    Stephen, Steffie Maria
    Jaekel, Arunita
    ELECTRONICS, 2021, 10 (13)
  • [47] Practical Metrics for Evaluating Anonymous Networks
    Wang, Zhi
    Zhang, Jinli
    Liu, Qixu
    Cui, Xiang
    Su, Junwei
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 3 - 18
  • [48] Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough
    Wiedersheim, Bjoern
    Ma, Zhendong
    Kargl, Frank
    Papadimitratos, Panos
    WONS 2010: SEVENTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, 2010, : 176 - 183
  • [49] A Symbolic Analysis of ECC-based Direct Anonymous Attestation
    Whitefield, Jorden
    Chen, Liqun
    Sasse, Ralf
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 127 - 141
  • [50] Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility
    Eichler, Stephan
    2007 IEEE INTELLIGENT VEHICLES SYMPOSIUM, VOLS 1-3, 2007, : 88 - 93