Balancing auditability and privacy in vehicular networks

Jong Youl Choi, Markus Jakobsson, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

99 Scopus citations

Abstract

We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop a realistic trust model, and an architecture that supports our solution. In order to ascertain that most users will not find it meaningful to disconnect or disable transponders, we design our solution with several types of user incentives as part of the structure. Examples of resulting features include anonymous toll collection; improved emergency response; and personalized and route-dependent traffic information.

Original languageEnglish
Title of host publicationQ2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
PublisherAssociation for Computing Machinery (ACM)
Pages79-87
Number of pages9
ISBN (Print)1595932410, 9781595932419
DOIs
StatePublished - 2005
Externally publishedYes
EventQ2SWinet'05: First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks - Montreal, QB, Canada
Duration: Oct 13 2005Oct 13 2005

Publication series

NameQ2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks

Conference

ConferenceQ2SWinet'05: First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
Country/TerritoryCanada
CityMontreal, QB
Period10/13/0510/13/05

Keywords

  • Audit
  • Incentive
  • Light-weight
  • Privacy
  • Symmetric

Fingerprint

Dive into the research topics of 'Balancing auditability and privacy in vehicular networks'. Together they form a unique fingerprint.

Cite this