Abstract
Vehicle-To-everything (V2X) communication is a broadcast messaging system intended to improve the efficiency and safety of connected and autonomous vehicles. In this paper we present a new V2X architecture and key management solution that reconciles the strong privacy guarantees of Direct Anonymous Attestation (DAA) with the efficiency, low-latency and accountability that is required for V2X. In contrast with the leading V2X standards, and uniquely in the literature, we prevent long-Term vehicle pseudonym tracking despite dishonest and colluding certificate authorities and whilst retaining centralised authority over revocation. Our Vehicular DAA (VDAA) scheme includes a novel construction that optimally limits Sybil attacks by restricting each vehicle to one anonymous pseudonym-request per epoch. We present a new security model for VDAA and show that we can reduce the unforgeability and unlinkability of our Elliptic Curve Digital Signature Algorithm (ECDSA) broadcast messages to the security of the underlying DAA scheme.
Original language | English |
---|---|
Title of host publication | Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 460-473 |
Number of pages | 14 |
ISBN (Electronic) | 9781728150871 |
DOIs | |
Publication status | Published - Sept 2020 |
Event | 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 - Virtual, Genoa, Italy Duration: 7 Sept 2020 → 11 Sept 2020 |
Publication series
Name | Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 |
---|
Conference
Conference | 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 |
---|---|
Country/Territory | Italy |
City | Virtual, Genoa |
Period | 7/09/20 → 11/09/20 |
Bibliographical note
Publisher Copyright:© 2020 IEEE.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
Keywords
- Attestation
- Authentication
- V2X
ASJC Scopus subject areas
- Artificial Intelligence
- Computer Networks and Communications
- Hardware and Architecture
- Software
- Safety, Risk, Reliability and Quality
- Information Systems and Management