Securing Pseudonym Schemes for Vehicular Privacy

Md Hasan, Hoda Maleki, Gagan Agrawal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This poster reports on a project to improve privacy in the presence of vehicle-to-everything (V2X) communication. Cooperative Intelligent Transport Systems (C-ITS) enable communication and information sharing between a vehicle and other entities using V2X. While there are many (emerging) applications for such messages, they also compromise privacy. Though pseudonym change strategies have been developed, privacy attacks have been demonstrated. This paper reports on a study that shows that by adding a small random noise to the length and widths of cars in V2X messages, these attacks can be defeated without negatively impacting the applications of these messages.

Original languageEnglish (US)
Title of host publicationProceedings - 2022 IEEE International Conference on Big Data, Big Data 2022
EditorsShusaku Tsumoto, Yukio Ohsawa, Lei Chen, Dirk Van den Poel, Xiaohua Hu, Yoichi Motomura, Takuya Takagi, Lingfei Wu, Ying Xie, Akihiro Abe, Vijay Raghavan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages6647-6649
Number of pages3
ISBN (Electronic)9781665480451
DOIs
StatePublished - 2022
Event2022 IEEE International Conference on Big Data, Big Data 2022 - Osaka, Japan
Duration: Dec 17 2022Dec 20 2022

Publication series

NameProceedings - 2022 IEEE International Conference on Big Data, Big Data 2022

Conference

Conference2022 IEEE International Conference on Big Data, Big Data 2022
Country/TerritoryJapan
CityOsaka
Period12/17/2212/20/22

Keywords

  • Intelligent transportation systems
  • Privacy
  • V2X Communications

ASJC Scopus subject areas

  • Modeling and Simulation
  • Computer Networks and Communications
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Securing Pseudonym Schemes for Vehicular Privacy'. Together they form a unique fingerprint.

Cite this