Abstract
Intelligent transportation systems are getting close to wide deployments. Vehicle to everything (V2X) communication as enabler for safer and more convenient transportation has attracted growing attention from industry and academia. However, security and privacy concerns of such communication must be addressed before reaching to a wide adoption. In this paper we analyze the security and privacy requirements of V2X communications and more specifically, elaborate on a new requirement regarding identity resolution in V2X communication which is absent in majority of previous work in this context. We believe that in near future similar requirements would be introduced by rulemaking authorities. Moreover, we refer to a recent case to back up our justification. We then propose a basic solution for the problem statement where just only one of the involved parties is dishonest.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IEEE guide for wireless access in vehicular environments (WAVE) - architecture. https://doi.org/10.1109/ieeestd.2014.6755433
3GPP: Study on LTE support for Vehicle-to-Everything (V2X) servicese, release 14 (2015). http://www.3gpp.org/ftp/Specs/archive/22_series/22.885/
3GPP: Architecture enhancements for V2X services, release 14 (2016). http://www.3gpp.org/ftp/Specs/archive/23_series/23.285/
3GPP: Study on enhancement of 3GPP support for 5G V2X services, release 15 (2016). http://www.3gpp.org/ftp/Specs/archive/22_series/22.886/
3GPP: 3G security; Lawful interception requirements, release 14 (2017). http://www.3gpp.org/ftp/Specs/archive/33_series/33.106/
Bißmeyer, N., Stübing, H., Schoch, E., Götz, S., Stotz, J.P., Lonc, B.: A generic public key infrastructure for securing car-to-x communication. In: 18th ITS World Congress, vol. 14, Orlando, USA (2011)
Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tut. 17(1), 228–255 (2015)
Titcomb, J., France-Presse, A.: Switzerland will notify citizens when they have been spied on under new surveillance laws (2016). http://www.telegraph.co.uk/technology/2016/09/26/switzerland-will-notify-citizens-when-they-have-been-spied-on-un/. Accessed 15 May 2017
Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: 2013 IEEE Vehicular Networking Conference. IEEE (2013). https://doi.org/10.1109/vnc.2013.6737583
Acknowledgement
We thank N. Asokan, Filippo Bonazzi and Moreno Ambrosin for contributing to the formulation of the target scenario and privacy requirements for it. The authors gratefully acknowledge Andrew Paverd for drawing our attention to the new Swiss legislation on surveillance of citizens.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Meskanen, T., Naderpour, M., Niemi, V. (2017). Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)