Please enable JavaScript.
Coggle requires JavaScript to display documents.
Privacy of vehicle to vehicle communication using secure pseudonym change
Privacy of vehicle to vehicle communication using secure pseudonym change
vulnerabilities in PCS
linking ability of location updates
frequency of pseudonym change
affect of repetition
knowledge of PCS to attacker
assessment of passive attacks on PCS
feasible local attacking scenarios
urban
dense
sparse
highway
dense
sparse
speed based attacking placement
distance based attacking placement
attacking capabilities
feasibility of global passive attack
achievable local passive attack
communication range
equipment placement
number of equipment
affect of longer eavesdropping
Effective privacy metric
suitable for comparison all existing schemes
identification of requirements for a consistent metric
Existing privacy metrics
success rate
anonymity set size
entropy
entropy of anonymity set size
proposed metric Tracking Success Rate
effective for successful tracking events by dropping the rate when unsuccessful tracking events happen
Modeling new PCS
Identify all the possble requirements
Threats, vulnerabilities, attacking capabilities, attack scenarios and mobility models
considering the feasibility in all mobility models
Protection against all the attacking scenarios
Approach- Situational context
balance safety and privacy