Pseudonym Issuing Strategies for Privacy-Preserving V2X Communication

Authors
Abstract
Content
Connected vehicle technology consisting of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication falls under the umbrella of V2X, or Vehicle-to-Everything, communication. This enables vehicles and infrastructure to exchange safety-related information to enable smarter, safer roads. If driver alerts are raised or automated action is taken as a result of these messages, it is critical that messages are trustworthy and reliable. To this end, the Security Credential Management System (SCMS) and Cooperative Intelligent Transportation Systems (C-ITS) Credential Management System (CCMS) have been proposed to enable authentication and authorization of V2X messages without compromising individual user privacy. This is accomplished by issuing each vehicle a large set of “pseudonyms,” unrelated to any real-world identity. During operation, the vehicle periodically switches pseudonyms, thereby changing its identity to others in the network. This article investigates strategies for issuing and managing these pseudonyms and highlights key differences between the various approaches that have been proposed.
Meta TagsDetails
DOI
https://doi.org/10.4271/11-02-02-0012
Pages
10
Citation
Henry, K., "Pseudonym Issuing Strategies for Privacy-Preserving V2X Communication," SAE Int. J. Transp. Cyber. & Privacy 2(2):131-139, 2019, https://doi.org/10.4271/11-02-02-0012.
Additional Details
Publisher
Published
Aug 18, 2020
Product Code
11-02-02-0012
Content Type
Journal Article
Language
English