dc.contributor.author | Zolotavkin, Y. | en |
dc.contributor.author | Baryshev, Y. | en |
dc.contributor.author | Lukichov V. | en |
dc.contributor.author | Mähn, J. | en |
dc.contributor.author | Köpsell, S. | en |
dc.contributor.author | Лукічов, В. В. | uk |
dc.date.accessioned | 2023-03-07T09:27:03Z | |
dc.date.available | 2023-03-07T09:27:03Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Zolotavkin Y., Baryshev Y., Lukichov V., Mähn J., Köpsell S. Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 21-23 February 2023. 2023. P. 677-685. | en |
dc.identifier.isbn | 978-989-758-624-8 | |
dc.identifier.issn | 2184-4356 | |
dc.identifier.uri | http://ir.lib.vntu.edu.ua//handle/123456789/36453 | |
dc.description.abstract | In this paper, we develop a new methodology to provide high assurance about privacy in Cooperative Intelligent
Transport Systems (C-ITS). Our focus lies on vehicle-to-everything (V2X) communications enabled by
Cooperative Awareness Basic Service. Our research motivation is developed based on the analysis of unlinkability
provision methods indicating a lack of such methods. To address this, we propose a Hidden Markov
Model (HMM) to express unlinkability for the situation two vehicles are communicating with a Roadside
Unit (RSU) using Cooperative Awareness Messages (CAMs). Our HMM has labeled states specifying
distinct origins of the CAMs observable by a passive attacker. We then establish that high assurance about the
degree of uncertainty (e.g., entropy) about labeled states can be obtained for the attacker under the assumption
that he knows actual positions of the vehicles (e.g., hidden states in HMM). We further demonstrate how
unlinkability can be increased in C-ITS: we propose a joint probability distribution that both drivers must use
to obfuscate their actual data jointly. This obfuscated data is then encapsulated in their CAMs. Finally, our
findings are incorporated into an obfuscation algorithm whose complexity is linear in the number of discrete
time steps in the HMM. | en |
dc.language.iso | en | en |
dc.publisher | Institute for Systems and Technologies of Information, Control and Communication | en |
dc.relation.ispartof | Proceedings of the 9th International Conference on Information Systems Security and Privacy – ICISSP, 21-23 February 2023 : 677-685. | en |
dc.subject | Privacy | en |
dc.subject | V2X | en |
dc.subject | Unlinkability | en |
dc.subject | Hidden Markov Model | en |
dc.subject | Cybersecurity | en |
dc.subject | Entropy | en |
dc.subject | Obfuscation | en |
dc.title | Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation | en |
dc.type | Article | |
dc.identifier.doi | 10.5220/0011786900003405 | |