VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol
- 1 October 2007
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Privacy-related issues are crucial for the wide diffusion of Vehicular Communications (VC). In particular, traffic analysis is one of the subtler threats to privacy in VC. In this paper we first briefly review current work in literature addressing privacy issues. Then we present VIPER: a Vehicle-to-infrastructure communication Privacy Enforcement pRotocol. VIPER is inspired to solutions provided for the Internet -mix- and cryptography-universal re- encryption. The protocol is shown to be resilient to traffic analysis attacks and analytical results suggest that it also performs well with respect to two key performance indicators: queue occupancy and message delivery time. Finally, simulation results support our analytical findings.Keywords
This publication has 4 references indexed in Scilit:
- Securing vehicular ad hoc networksJournal of Computer Security, 2007
- Project “anonymity and unobservability in the Internet”Published by Association for Computing Machinery (ACM) ,2000
- CrowdsACM Transactions on Information and System Security, 1998
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981