作者: Bastian Bloessl , Christoph Sommer , Falko Dressler , David Eckhoff
DOI: 10.1109/ICCNC.2015.7069376
关键词: Physical layer 、 Vehicular ad hoc network 、 Network packet 、 Application layer 、 Exploit 、 Computer security 、 Engineering 、 Computer network 、 Scrambler 、 Privacy software 、 Key (cryptography)
摘要: Vehicular networks provide the basis for a wide range of both safety and non-safety applications. One key challenges acceptance is to which degree drivers' privacy can be protected. The main technical protection mechanism use changing identifiers (from MAC application layer), so called pseudonyms. effectiveness this approach, however, clearly reduced if specific characteristics physical layer (e.g., in transmitted signal) reveal link between two messages with different In paper, we present such fingerprinting technique: scrambler attack. contrast other methods, it does not rely on potentially fragile features channel or hardware, but exploits state that each receiver has derive order decode packet, making attack extremely robust. We show how bypasses state-of-the-art approaches quantify degradation location an extensive simulation study. Based our results, identify additional technological requirements enable mechanisms large scale.