Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudonymous authentication secures communication while enhancing user privacy. To enhance location privacy, cryptographic mix-zones were proposed to facilitate vehicles covertly transition to new ephemeral credentials. The resilience to (syntactic and semantic) pseudonym linking (attacks) highly depends on the geometry of the mix-zones, mobility patterns, vehicle density, and arrival rates. We introduce a tracking algorithm for linking pseudonyms before and after a cryptographically protected mix-zone. Our experimental results show that an eavesdropper, leveraging standardized vehicular communication messages and road layout, could successfully lin...
The hostile environment in which Vehicular Ad hoc Networks (VANETs) operate make them vulnerable to ...
AbstractOne of the key challenges in the success of vehicular ad hoc networks (VANETs) is to conside...
The first main contribution of this chapter is to take a non-trivial step towards providing a robust...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
In vehicular communication systems, cooperative awareness messages provide contextual information re...
Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authe...
Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authe...
Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with roadside units, t...
Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency...
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do ...
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-o...
Currently, the issue of location privacy has been attracting increasing attention. In traditional ps...
Abstract—Privacy protection is of critical concern to Location-Based Service (LBS) users in mobile n...
Abstract—Privacy protection is of critical concern to Location-Based Service (LBS) users in mobile n...
The hostile environment in which Vehicular Ad hoc Networks (VANETs) operate make them vulnerable to ...
AbstractOne of the key challenges in the success of vehicular ad hoc networks (VANETs) is to conside...
The first main contribution of this chapter is to take a non-trivial step towards providing a robust...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
In vehicular communication systems, cooperative awareness messages provide contextual information re...
Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authe...
Inter-vehicle communications disclose rich information about vehicle whereabouts. Pseudonymous authe...
Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with roadside units, t...
Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency...
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do ...
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-o...
Currently, the issue of location privacy has been attracting increasing attention. In traditional ps...
Abstract—Privacy protection is of critical concern to Location-Based Service (LBS) users in mobile n...
Abstract—Privacy protection is of critical concern to Location-Based Service (LBS) users in mobile n...
The hostile environment in which Vehicular Ad hoc Networks (VANETs) operate make them vulnerable to ...
AbstractOne of the key challenges in the success of vehicular ad hoc networks (VANETs) is to conside...
The first main contribution of this chapter is to take a non-trivial step towards providing a robust...