uACPC: Client-Initiated Privacy-Preserving ACPC Model
ISSN: 2572-1046, e-ISSN: 2572-1054
Published July 27, 2020 by SAE International in United States
Citation: Cunha, H., Luther, T., Ricardini, J., Ogawa, H. et al., "uACPC: Client-Initiated Privacy-Preserving ACPC Model," SAE Int. J. Transp. Cyber. & Privacy 3(1):2020.
With the adoption of Vehicle-to-everything (V2X) technology, security and privacy of vehicles are paramount. To avoid tracking while preserving vehicle/driver’s privacy, modern vehicular public key infrastructure provision vehicles with multiple short-term pseudonym certificates. However, provisioning a large number of pseudonym certificates can lead to an enormous growth of Certificate Revocation Lists (CRLs) during its revocation process. One possible approach to avoid such CRL growth is by relying on activation code (AC)-based solutions. In such solutions, the vehicles are provisioned with batches of encrypted certificates, which are decrypted periodically via the ACs (broadcasted by the back-end system). When the system detects a revoked vehicle, it simply does not broadcast the respective vehicle’s AC. As a result, revoked vehicles do not receive their respective AC and are prevented from decrypting their certificates. Consequently, the need to add such vehicles on the CRL is expunged. In this article, we introduce uACPC, which extends the distribution of ACs (in a privacy-preserving manner) to the unicast mode of communication. In uACPC, the ACs are distributed by the back-end system via a unicast channel upon the receipt of the vehicle’s direct request for their respective ACs. In addition, we show that uACPC can leverage the edge computing architecture for faster and timely distribution of CRLs. In particular, edge computing can bring low-latency delivery of CRLs and higher availability for the distribution of ACs.