0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
0
10
20
ρ
U,b
|U
g
| [#]
Figure 11: The anonymity set size in dependence of the
probability of blocked users.
decentralized. We tackle to balance both require-
ments, privacy and integrity.
Our evaluation was done with Veins showing that
HGM improves the privacy of users by hiding them
along with other members in regions with uniform
probability. Among other things, the results also show
that our approach is robust in terms of dishonest par-
ticipants who suppress messages. We also show that
the overhead related to HGM is acceptable.
In future work we would like to extend our anal-
ysis to a more realistic scenario such as (Codeca
et al., 2016). We want to increase performance using
WAVE’s channel switching in the simulation. In addi-
tion, we want to strengthen our attacker by including
external knowledge such as derived user behavior and
analyze tracers.
ACKNOWLEDGEMENTS
This research was partly funded by the German Fed-
eral Ministry of Education and Research (BMBF)
with grant number: 16KIS0367K.
REFERENCES
Alexiou, N., Lagan
`
a, M., Gisdakis, S., Khodaei, M., and
Papadimitratos, P. (2013). VeSPA. In Proceedings
of the 2nd ACM workshop on Hot topics on wireless
network security and privacy - HotWiSec ’13, page 19,
New York, New York, USA. ACM Press.
Bilgin, B. E. and Gungor, V. C. (2013). Performance
Comparison of IEEE 802.11p and IEEE 802.11b for
Vehicle-to-Vehicle Communications in Highway, Ru-
ral, and Urban Areas. International Journal of Vehic-
ular Technology, 2013:1–10.
Bl
¨
omer, J., Juhnke, J., and L
¨
oken, N. (2016). Short group
signatures with distributed traceability. In Mathemat-
ical Aspects of Computer and Information Sciences.
MACIS 2015. Lecture Notes in Computer Science, vol-
ume 9582, pages 166–180. Springer, Cham.
Boneh, D., Boyen, X., and Shacham, H. (2004). Short
group signatures. In Franklin, M., editor, Advances
in Cryptology – CRYPTO 2004, pages 41–55, Berlin,
Heidelberg. Springer Berlin Heidelberg.
Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W.,
Kumar, V., Hehn, T., and Goudy, R. (2018). A secu-
rity credential management system for V2X commu-
nications. CoRR, abs/1802.05323.
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., and
Lioy, A. (2007). Efficient and robust pseudonymous
authentication in VANET. In Proceedings of the
Fourth ACM International Workshop on Vehicular Ad
Hoc Networks, VANET ’07, pages 19–28, New York,
NY, USA. ACM.
Camenisch, J. (1997). Efficient and generalized group
signatures. In Advances in Cryptology – EURO-
CRYPT ’97. EUROCRYPT 1997. Lecture Notes in
Computer Science, volume 1233, pages 465–479.
Springer, Berlin, Heidelberg.
Chaum, D. and Van Heyst, E. (1991). Group signatures.
In Advances in Cryptology — EUROCRYPT ’91. EU-
ROCRYPT 1991. Lecture Notes in Computer Science,
volume 547 LNCS, pages 257–265. Springer, Berlin,
Heidelberg.
Chaum, D. L. (1981). Untraceable electronic mail, return
addresses, and digital pseudonyms. Communications
of the ACM, 24(2):84–90.
Chen, L., Ng, S.-L., and Wang, G. (2011). Threshold anony-
mous announcement in vanets. IEEE Journal on Se-
lected Areas in Communications, 29:605–615.
Chen, L. and Pedersen, T. P. (1995). New group signature
schemes. In De Santis, A., editor, Advances in Cryp-
tology – EUROCRYPT’94, pages 171–181. Springer,
Berlin, Heidelberg.
Codeca, L., Frank, R., and Engel, T. (2016). Luxembourg
SUMO Traffic (LuST) Scenario: 24 hours of mobility
for vehicular networking research. In IEEE Vehicular
Networking Conference, VNC, volume 2016-January,
pages 1–8. IEEE Computer Society.
Delerabl
´
ee, C. and Pointcheval, D. (2006). Dynamic Fully
Anonymous Short Group Signatures. In VIETCRYPT
2006, pages 193–210.
Fischlin, M. (2005). Communication-Efficient Non-
interactive Proofs of Knowledge with Online Extrac-
tors. In Shoup, V., editor, Advances in Cryptology –
CRYPTO 2005, pages 152–168. Springer Berlin Hei-
delberg.
Gr
¨
afling, S., M
¨
ah
¨
onen, P., and Riihij
¨
arvi, J. (2010). Per-
formance evaluation of IEEE 1609 WAVE and IEEE
802.11p for vehicular communications. In ICUFN
2010 - 2nd International Conference on Ubiquitous
and Future Networks, pages 344–348.
Guo, J., Baugh, J. P., and Wang, S. (2007). A group sig-
nature based secure and privacy-preserving vehicu-
lar communication framework. In 2007 Mobile Net-
working for Vehicular Environments, pages 103–108.
IEEE.
Hao, Y., Cheng, Y., and Ren, K. (2008). Distributed key
management with protection against RSU compro-
mise in group signature based VANETs. In GLOBE-
COM - IEEE Global Telecommunications Conference,
pages 4951–4955. IEEE.
Hu, W., Xue, K., Hong, P., and Wu, C. (2011). Atcs:
A novel anonymous and traceable communication
scheme for vehicular Ad hoc networks. International
Journal of Network Security, 13(2):71–78.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
162