Impact of V2X privacy strategies on Intersection Collision Avoidance systems

User privacy is a requirement for wireless vehicular communications, and a number of privacy protection strategies have already been developed and standardized. In particular, methods relying on the use of temporary pseudonyms and silent periods have proved their ability to confuse attackers who would attempt to track vehicles. In addition to their ability to protect privacy, it is important to ensure that these privacy strategies do not hinder the safety applications which rely on vehicular communications. This paper addresses this concern and presents an experimental analysis of the impact of privacy strategies on Intersection Collision Avoidance (ICA) systems. We simulate traffic scenarios at a road intersection and compare the ability of a collision avoidance system to avoid collisions for different pseudonym change schemes. The privacy level is analyzed, as well as the influence of the duration of the silent period on the safety performance of the ICA system. The results highlight the need to jointly design safety applications and privacy strategies.

[1]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[2]  Toshiyuki Inagaki Technological and Legal Considerations for the Design of Interactions between Human Driver and Advanced Driver Assistance Systems , 2011 .

[3]  C Frye INTERNATIONAL COOPERATION TO PREVENT COLLISIONS AT INTERSECTIONS , 2001 .

[4]  Zhendong Ma,et al.  Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[5]  Fan Bai,et al.  Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[6]  David C. Parkes,et al.  Non-Cooperative Location Privacy , 2013, IEEE Transactions on Dependable and Secure Computing.

[7]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[8]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[9]  David C. Parkes,et al.  On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.

[10]  Katja Vogel,et al.  A comparison of headway and time to collision as safety indicators. , 2003, Accident; analysis and prevention.

[11]  Yih-Chun Hu,et al.  Communication requirements for crash avoidance , 2010, VANET '10.

[12]  Matthias Gerlach,et al.  Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[13]  Li Feng,et al.  An Analytical Model for Random Changing Pseudonyms Scheme in VANETs , 2011, 2011 International Conference on Network Computing and Information Security.

[14]  Zoubir Mammeri,et al.  Dynamic consensus for secured vehicular ad hoc networks , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[15]  Reinhard German,et al.  Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.

[16]  Kay Fuerstenberg,et al.  First European STREP on Cooperative Intersection Safety, INTERSAFE-2 , 2010, 13th International IEEE Conference on Intelligent Transportation Systems.

[17]  Wassim G. Najm,et al.  Frequency of Target Crashes for IntelliDrive Safety Systems , 2010 .

[18]  S. Eichler Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility , 2007, 2007 IEEE Intelligent Vehicles Symposium.

[19]  Azim Eskandarian,et al.  Handbook of Intelligent Vehicles , 2012 .

[20]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[21]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[22]  Christian Laugier,et al.  Evaluating risk at road intersections by detecting conflicting intentions , 2012, 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[23]  Levente Buttyán,et al.  SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[24]  Christian Laugier,et al.  Risk assessment at road intersections: Comparing intention and expectation , 2012, 2012 IEEE Intelligent Vehicles Symposium.

[25]  Alan Kirk,et al.  Accident causation and pre-accidental driving situations. Part 2. In-depth accident causation analysis , 2008 .

[26]  Hariharan Krishnan,et al.  Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.