An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

In Vehicular Ad Hoc Networks (VANETs) used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications implemented with the Dedicated Short Range Communications (DSRC) standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately identify and fingerprint wireless devices through their radio frequency (RF) emissions has been demonstrated in the literature. This capability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper investigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this paper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading.

[1]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[2]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[3]  Kui Ren,et al.  Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.

[4]  David W. Matolak,et al.  Vehicle–Vehicle Channel Models for the 5-GHz Band , 2008, IEEE Transactions on Intelligent Transportation Systems.

[5]  Pascal Lorenz,et al.  Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.

[6]  Bryan Nousain,et al.  Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags , 2012, IEEE Transactions on Industrial Electronics.

[7]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  Michael A. Temple,et al.  Intrinsic Physical-Layer Authentication of Integrated Circuits , 2012, IEEE Transactions on Information Forensics and Security.

[9]  J. Kittler Feature selection and extraction , 1978 .

[10]  Yunxin Li,et al.  An Overview of the DSRC/WAVE Technology , 2010, QSHINE.

[11]  Sheldon A. Munns,et al.  RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.

[12]  Jakob Hasse,et al.  Forensic identification of GSM mobile phones , 2013, IH&MMSec '13.

[13]  Hakima Chaouchi,et al.  Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing , 2016, Mob. Inf. Syst..

[14]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[15]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[16]  Fredrik Tufvesson,et al.  Characterization of Vehicle-to-Vehicle Radio Channels from Measurements at 5.2 GHz , 2009, Wirel. Pers. Commun..

[17]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[18]  Lorenzo Rubio,et al.  Analysis of Small-Scale Fading Distributions in Vehicle-to-Vehicle Communications , 2016, Mob. Inf. Syst..

[19]  M.A. Ingram,et al.  Six time- and frequency- selective empirical channel models for vehicular wireless LANs , 2007, IEEE Vehicular Technology Magazine.

[20]  Kevin W. Sowerby,et al.  Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios , 2014, IET Commun..

[21]  Guillermo Acosta-Marum,et al.  Wave: A tutorial , 2009, IEEE Communications Magazine.

[22]  Ricardo Neisse,et al.  A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.