VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol

Paolo Cencioni, Roberto Di Pietro

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Privacy-related issues are crucial for the wide diffusion of Vehicular Communications (VC). In particular, traffic analysis is one of the subtler threats to privacy in VC. In this paper we first briefly review current work in literature addressing privacy issues. Then we present VIPER: a Vehicle-to-Infrastructure communication Privacy Enforcement pRotocol. VIPER is inspired to solutions provided for the Internet - mix - and cryptography - universal reencryption. The protocol is shown to be resilient to traffic analysis attacks and analytical results suggest that it also performs well with respect to two key performance indicators: queue occupancy and message delivery time. Finally, simulation results support our analytical findings. ©2007 IEEE.
Original languageEnglish (US)
Title of host publication2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS
DOIs
StatePublished - Dec 1 2007
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2023-09-20

Fingerprint

Dive into the research topics of 'VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol'. Together they form a unique fingerprint.

Cite this