Pavlo Gaiduk, K. Ranjan, T. Basmer, Florian Tschorsch
{"title":"车载网络中保护隐私的公钥基础设施","authors":"Pavlo Gaiduk, K. Ranjan, T. Basmer, Florian Tschorsch","doi":"10.1109/LCN48667.2020.9314787","DOIUrl":null,"url":null,"abstract":"Cooperative intelligent transport systems promise considerable improvements on road safety and the utilization of transport infrastructures. Current approaches, however, build upon policies to protect privacy, which raise serious concerns. In this paper, we propose a privacy-preserving public key infrastructure (PKI) for vehicle-to-everything communication. We use zero-knowledge proofs to authenticate, while still being able to hide identities. In order to exclude malicious actors, we integrate an anonymous reputation-based blacklisting scheme. Our benchmarks on an on-board connectivity unit with resource-constrained hardware confirms the feasibility of the approach. Specifically, we expect approximately 67 kB payload and 35 minutes computation time per day to authenticate.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Privacy-Preserving Public Key Infrastructure for Vehicular Networks\",\"authors\":\"Pavlo Gaiduk, K. Ranjan, T. Basmer, Florian Tschorsch\",\"doi\":\"10.1109/LCN48667.2020.9314787\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cooperative intelligent transport systems promise considerable improvements on road safety and the utilization of transport infrastructures. Current approaches, however, build upon policies to protect privacy, which raise serious concerns. In this paper, we propose a privacy-preserving public key infrastructure (PKI) for vehicle-to-everything communication. We use zero-knowledge proofs to authenticate, while still being able to hide identities. In order to exclude malicious actors, we integrate an anonymous reputation-based blacklisting scheme. Our benchmarks on an on-board connectivity unit with resource-constrained hardware confirms the feasibility of the approach. Specifically, we expect approximately 67 kB payload and 35 minutes computation time per day to authenticate.\",\"PeriodicalId\":245782,\"journal\":{\"name\":\"2020 IEEE 45th Conference on Local Computer Networks (LCN)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 45th Conference on Local Computer Networks (LCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN48667.2020.9314787\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN48667.2020.9314787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy-Preserving Public Key Infrastructure for Vehicular Networks
Cooperative intelligent transport systems promise considerable improvements on road safety and the utilization of transport infrastructures. Current approaches, however, build upon policies to protect privacy, which raise serious concerns. In this paper, we propose a privacy-preserving public key infrastructure (PKI) for vehicle-to-everything communication. We use zero-knowledge proofs to authenticate, while still being able to hide identities. In order to exclude malicious actors, we integrate an anonymous reputation-based blacklisting scheme. Our benchmarks on an on-board connectivity unit with resource-constrained hardware confirms the feasibility of the approach. Specifically, we expect approximately 67 kB payload and 35 minutes computation time per day to authenticate.