traffic flow, leading to high values of |I|, rarely occur
in practice. Thus, VU will exceed 99.9% in most real
world scenarios with moderate traffic flow.
Higher values of |I| than the ones used above
would relate to unrealistically high traffic flow or ex-
tending the size of mix zones and length of silent peri-
ods to values rendering higher level ITS-applications
unusable (Tomandl et al., 2012). Calculation of VU is
independent of the pseudonym switching strategy, but
the achievable size of |I| differs. While cooperative
PSC switching strategies can adjust it, uncoordinated
ones, e.g., from ETSI ITS or WAVE, cannot do so.
The obtained results show that even without other
tracking mechanism an attacker can track a vehicle
with high probability using just a small set of con-
stant volatile data, even though the vehicle performed
a pseudonym change. This shows that the presence of
volatile constant data is able to render PSC changes
useless, as an attacker can re-identify vehicles us-
ing this data after the pseudonym change. Combin-
ing this attack with further tracking mechanisms, e.g.,
from (Tomandl et al., 2012), promises to achieve very
high tracking probabilities. Thus, the mechanisms for
avoiding volatile constant data in VANET messages
suggested in Section 3 should be used to limit the
trackability of vehicles.
5 CONCLUSIONS AND FUTURE
WORK
With upcoming deployment also privacy aspects of
VANETs gain increased attention. Therefore, we
studied the influence of information currently present
in ETSI ITS and WAVE standards on proposed pri-
vacy protecting pseudonym usage strategies.
Thereby, we find that the main requirement of
pseudonym change strategies, the cooperation of mul-
tiple indistinguishable vehicles, is unlikely to be
found in practice with current standards being in use.
Multiple suggestions have been made to improve this
situation, which require to adjust the standards.
Future work can implement the outlined tracking
mechanisms in a simulation environment to study the
influence of parameters like CAM generation rules.
REFERENCES
(2010). Intelligent Transport Systems (ITS); Security; Se-
curity Services and Architecture. V1.1.1.
(2011). Memorandum of Understanding for OEMs within
the CAR 2 CAR Communication Consortium on De-
ployment Strategy for cooperative ITS in Europe.
(2012). Draft Standard for Wireless Access in Vehicular
Environments - Security Services for Applications and
Management Messages. P1609.2, D12.
(2013a). Intelligent Transport Systems (ITS); Facilities
layer function; Facility Position and time manage-
ment. V0.0.2.
(2013). Intelligent Transport Systems (ITS); Security; Se-
curity header and certificate formats. V1.1.1.
(2013b). Intelligent Transport Systems (ITS); Users and
applications requirements; Part 2: Applications and
facilities layer common data dictionary. V1.1.1.
(2013). Intelligent Transport Systems (ITS); Vehicular
Communications; Basic Set of Applications; Part 2:
Specification of Cooperative Awareness Basic Ser-
vice. ES 302637-2, V1.3.0.
Ammoun, S. and Nashashibi, F. (2009). Real time trajec-
tory prediction for collision risk estimation between
vehicles. In IEEE ICCP.
Bittl, S., Gonzalez, A. A., and Heidrich, W. (2014). Perfor-
mance Comparision of Encoding Schemes for ETSI
ITS C2X Communication Systems. In VEHICULAR,
pages 58–63.
Buttyan, L., Holczer, T., Weimerskirch, A., and Whyte,
W. (2009). SLOW: A Practical pseudonym changing
scheme for location privacy in VANETs. In IEEE Ve-
hicular Networking Conference, pages 1–8.
Eichler, S. (2007). Strategies for Pseudonym Changes in
Vehicular Ad Hoc Networks depending on Node Mo-
bility. In IEEE Intelligent Vehicles Symposium.
Gerlach, M. and G
¨
uttler, F. (2007). Privacy in VANETs us-
ing Changing Pseudonyms - Ideal and Real. In IEEE
VTC, pages 2521–2525.
Houenou, A., Bonnifait, P., Cherfaoui, V., and Yao, W.
(2013). Vehicle Trajectory Prediction based on Mo-
tion Model and Maneuver Recognition. In IEEE
IROS, pages 4363–4369.
J. Harding et. al. (2014). Vehicle-to-Vehicle Communica-
tions: Readiness of V2V Technology for Application.
Technical Report DOT HS 812 014, Washington, DC:
National Highway Traffic Safty Administration.
Kraftfahrt-Bundesamt (2014). Neuzulassungen von Person-
enkraftwagen im August 2014 nach Marken und Mod-
ellreihen. online: 10.01.2015.
Nowdehi, N. and Olovsson, T. (2014). Experiences from
Implementing the ETSI ITS SecuredMessage Service.
In IEEE IVS, pages 1055–1060.
Scheuer, F., Pl
¨
oßl, K., and Fedrrath, H. (2008). Preventing
Profile Generation in Vehicular Networks. In IEEE
WiMob, pages 520–525.
Sch
¨
utze, T. (2011). Automotive Security: Cryptography for
Car2X Communication. In Embedded World Confer-
ence.
Tomandl, A., Scheuer, F., and Federrath, H. (2012).
Simulation-based Evaluation of Techniques for Pri-
vacy Protection in VANETs. In IEEE WiMob, pages
165–172.
Wiedersheim, B., Ma, Z., Kargl, F., and Papadimitratos, P.
(2010). Privacy in Inter-Vehicular Networks: Why
simple pseudonym change is not enough. In WONS,
pages 176–183.
PrivacyIssuesandPitfallsinVANETStandards
151