Privacy Issues in Vehicular Ad Hoc Networks. - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Privacy Issues in Vehicular Ad Hoc Networks.

Description:

BMW Group Template Last modified by: Florian D tzer Created Date: 7/26/2002 8:40:43 PM Document presentation format: Bildschirmpr sentation Other titles: – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 21
Provided by: petworksh
Category:

less

Transcript and Presenter's Notes

Title: Privacy Issues in Vehicular Ad Hoc Networks.


1
Privacy Issues in Vehicular Ad Hoc Networks.
Florian Dötzer BMW Group Research and Technology
2
Agenda.
  • Introduction
  • Privacy in VANETs
  • Exemplary Approach
  • Future Work / Conclusion

3
Agenda.
  • Introduction
  • Privacy in VANETs
  • Exemplary Approach
  • Future Work / Conclusion

4
Ad-hoc Networks.From Cellular to VANET.
5
MANETs and VANETs.Properties.
Decentralized Self - Organizing
6
VANET.Application Local Danger Warning.
7
VANETs.Security Requirements.
Authentic Information Trust Establishment vs.
Information Matching Availability Node
Cooperation, DoS, Secure Routing Privacy Locatio
n Privacy, Identities, Profiling
8
Agenda.
  • Introduction
  • Privacy in VANETs
  • Exemplary Approach
  • Future Work / Conclusion

9
Privacy.Importance for VANETs.
Cars Personal Devices Position is known Cars
get connected
10
VANET Privacy.Example Threats and Attacks.
Automated Law Enforcement Identity
Tracking Configuration Fingerprinting RF-Fingerpri
nting Location Recording Movement
Profiles Communication Relations
11
VANET Privacy.Requirements.
Use of pseudonyms (no real-world
identities) Multiple pseudonyms may be
used Pseudonym change ? application
requirements Pseudonyms ? real-world ID
mapping Properties / privileges cryptographically
bound
12
Agenda.
  • Introduction
  • Privacy in VANETs
  • Exemplary Approach
  • Future Work / Conclusion

13
Trusted Authority Approach.A Cars Setup Phase.
Phase I Separation of ID and service usage
Privacy
14
Trusted Authority Approach.Normal Usage.
Sender
Phase II Receiver can verify message
15
Trusted Authority Approach.Revocation Phase.
Signature OK! BUT Information is not
correct OR sender malfunctioning
Sender
Phase III Disclosure of sender ID
16
Trusted Authority Approach.Evaluation.
Pros Fulfills given requirements Provides
strong privacy Cons - Requires independent,
trusted authority - Problem of detecting wrong
messages
17
Agenda.
  • Introduction
  • Privacy in VANETs
  • Exemplary Approach
  • Future Work / Conclusion

18
Future Work.And Open Questions
How to change pseudonyms? Feasibility of
Organizational Solution Feasibility of Smart Card
Approach Location Related Pseudonyms System
without IDs?
19
Conclusion.
Privacy is essential for VANETs Privacy must be
considered at system design Trusted authority
approach is far from perfect Additional research
is necessary
20
Thanks for Listening.Questions?
Write a Comment
User Comments (0)
About PowerShow.com