Title: Privacy Issues in Vehicular Ad Hoc Networks.
1Privacy Issues in Vehicular Ad Hoc Networks.
Florian Dötzer BMW Group Research and Technology
2Agenda.
- Introduction
- Privacy in VANETs
- Exemplary Approach
- Future Work / Conclusion
3Agenda.
- Introduction
- Privacy in VANETs
- Exemplary Approach
- Future Work / Conclusion
4Ad-hoc Networks.From Cellular to VANET.
5MANETs and VANETs.Properties.
Decentralized Self - Organizing
6VANET.Application Local Danger Warning.
7VANETs.Security Requirements.
Authentic Information Trust Establishment vs.
Information Matching Availability Node
Cooperation, DoS, Secure Routing Privacy Locatio
n Privacy, Identities, Profiling
8Agenda.
- Introduction
- Privacy in VANETs
- Exemplary Approach
- Future Work / Conclusion
9Privacy.Importance for VANETs.
Cars Personal Devices Position is known Cars
get connected
10VANET Privacy.Example Threats and Attacks.
Automated Law Enforcement Identity
Tracking Configuration Fingerprinting RF-Fingerpri
nting Location Recording Movement
Profiles Communication Relations
11VANET Privacy.Requirements.
Use of pseudonyms (no real-world
identities) Multiple pseudonyms may be
used Pseudonym change ? application
requirements Pseudonyms ? real-world ID
mapping Properties / privileges cryptographically
bound
12Agenda.
- Introduction
- Privacy in VANETs
- Exemplary Approach
- Future Work / Conclusion
13Trusted Authority Approach.A Cars Setup Phase.
Phase I Separation of ID and service usage
Privacy
14Trusted Authority Approach.Normal Usage.
Sender
Phase II Receiver can verify message
15Trusted Authority Approach.Revocation Phase.
Signature OK! BUT Information is not
correct OR sender malfunctioning
Sender
Phase III Disclosure of sender ID
16Trusted Authority Approach.Evaluation.
Pros Fulfills given requirements Provides
strong privacy Cons - Requires independent,
trusted authority - Problem of detecting wrong
messages
17Agenda.
- Introduction
- Privacy in VANETs
- Exemplary Approach
- Future Work / Conclusion
18Future Work.And Open Questions
How to change pseudonyms? Feasibility of
Organizational Solution Feasibility of Smart Card
Approach Location Related Pseudonyms System
without IDs?
19Conclusion.
Privacy is essential for VANETs Privacy must be
considered at system design Trusted authority
approach is far from perfect Additional research
is necessary
20Thanks for Listening.Questions?