{"title":"Risk Analysis on C-ITS Pseudonymity Aspects","authors":"Farah Haidar, Arnaud Kaiser, B. Lonc, P. Urien","doi":"10.1109/NTMS.2019.8763826","DOIUrl":null,"url":null,"abstract":"In the near future, vehicles will communicate with their environment by broadcasting Vehicle to everything (V2x) messages over the vehicular network (IEEE 802.11p). The exchanged messages contain data related to driver's privacy. As the laws in Europe require the privacy protection, the solution is to use pseudonym identities (certificates) in the communication. However, the use of these certificates can create new vulnerabilities that must be taken into account. In this paper, we do a state of art on the existing vulnerabilities, we applied the TVRA method and propose new vulnerabilities. Finally, we propose new countermeasures that could be implemented.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2019.8763826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the near future, vehicles will communicate with their environment by broadcasting Vehicle to everything (V2x) messages over the vehicular network (IEEE 802.11p). The exchanged messages contain data related to driver's privacy. As the laws in Europe require the privacy protection, the solution is to use pseudonym identities (certificates) in the communication. However, the use of these certificates can create new vulnerabilities that must be taken into account. In this paper, we do a state of art on the existing vulnerabilities, we applied the TVRA method and propose new vulnerabilities. Finally, we propose new countermeasures that could be implemented.