Title :
VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol
Author :
Cencioni, Paolo ; Di Pietro, Roberto
Author_Institution :
Univ. di Roma, Rome
Abstract :
Privacy-related issues are crucial for the wide diffusion of Vehicular Communications (VC). In particular, traffic analysis is one of the subtler threats to privacy in VC. In this paper we first briefly review current work in literature addressing privacy issues. Then we present VIPER: a Vehicle-to-infrastructure communication Privacy Enforcement pRotocol. VIPER is inspired to solutions provided for the Internet -mix- and cryptography-universal re- encryption. The protocol is shown to be resilient to traffic analysis attacks and analytical results suggest that it also performs well with respect to two key performance indicators: queue occupancy and message delivery time. Finally, simulation results support our analytical findings.
Keywords :
cryptographic protocols; mobile radio; public key cryptography; queueing theory; Internet; VIPER; cryptography; message delivery time; privacy enforcement protocol; queue occupancy; vehicle-to-infrastructure communication privacy enforcement protocol; vehicular communication privacy; Ad hoc networks; Analytical models; Cryptographic protocols; Data security; Performance analysis; Privacy; Queueing analysis; Road vehicles; Traffic control; Virtual colonoscopy; anonymity; privacy; traffic analysis; vehicular communication;
Conference_Titel :
Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE International Conference on
Conference_Location :
Pisa
Print_ISBN :
978-1-4244-1454-3
Electronic_ISBN :
978-1-4244-1455-0
DOI :
10.1109/MOBHOC.2007.4428740