Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Privacy endangerment from protocol data sets in VANETs and countermeasures

: Bittl, Sebastian; Gonzalez, Arturo A.

Postprint urn:nbn:de:0011-n-3788890 (320 KByte PDF)
MD5 Fingerprint: 6cf54acea1a8ffbb675c2899345df6e2
Created on: 13.2.2016

Helfert, M.:
Smart Cities, Green Technologies, and Intelligent Transport Systems. 4th International Conference, SMARTGREENS 2015, and 1st International Conference VEHITS 2015 : Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers
Cham: Springer International Publishing, 2015 (Communications in computer and information science 579)
ISBN: 978-3-319-27752-3 (Print)
ISBN: 978-3-319-27753-0 (Online)
International Conference on Smart Cities and Green ICT Systems (SMARTGREENS) <4, 2015, Lisbon>
International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS) <1, 2015, Lisbon>
Conference Paper, Electronic Publication
Fraunhofer ESK ()
VANET; ETSI ITS; privacy; security; Car2X; Car-to-x; vehicle-to-X; V2X; automotive connectivity

Wireless vehicular networks are about to be deployed within the next years. Important progress towards practical usage of such networks is being made by standardization in Europe and the USA. Thereby, one of the core concerns is privacy of vehicles and their drivers, especially in Europe. Prior work has regarded only a small sub-set of the information exposed by current standards to an attacker for vehicle tracking. Thus, we take a close look on the data contained on different protocol layers of an ETSI ITS system. We find that much data is very distinctive and can be used to identify static vehicle properties such as manufacturer or even model. We call these data sets volatile constant data. Its presence is shown to greatly reduce usability of formerly proposed cooperative pseudonym switching strategies. Thereby, a privacy metric called vehicular uniqueness is introduced. The provided analysis shows that more constraints have to be applied for selecting appropriate cooperation partners for pseudonym switching, which significantly reduces their availability. Therefore, current techniques cannot provide the level of privacy defined in VANET standards. Suggestions for improving the data sets used by security entity and facility layer of ETSI ITS are given to limit the impact of the found issues. Effectiveness of the proposed mechanisms is shown in the provided evaluation.