V2X-DAA

Direct Anonymous Attestation (DAA) as an alternative trust model for V2X security

  • Project Name: V2X-DAA — DAA-enabled Security for Cooperative, Connected & Automated Mobility (CCAM)
  • Duration: January 2021 – March 2022
  • Funding: Bilateral industry collaboration (with UBITECH)
  • Links: UBITECH announcement
  • My Role: Project Initiator / Technical lead for architecture & evaluation

TL;DR

  • Problem: PKI-based V2X scales poorly and strains privacy: bulk pseudonym provisioning, CRLs, and backend dependency. (Giannetsos & Krontiris, 2019)
  • Idea: Move trust to the vehicle using Direct Anonymous Attestation (DAA) + TPM. Vehicles self-issue unlinkable pseudonyms; revocation is device-enforced (no CRLs). (Larsen et al., 2021)
  • Evidence: We built both PKI and DAA pipelines on an ETSI-aligned V2X stack and measured them head-to-head. Under realistic channel loads, end-to-end latency converges, while DAA delivers cleaner revocation and no refill logistics. (Angelogianni et al., 2023)

Why PKI struggles at scale

Modern SCMS/CCMS deployments rely on central authorities to mint and refresh thousands of short-lived pseudonyms per vehicle and to distribute revocation state. This is operationally heavy, connectivity-sensitive, and creates privacy pressure even with separation-of-duties. (Giannetsos & Krontiris, 2019)

Our approach: vehicle-centric trust with DAA

We designed a V2X security architecture that anchors trust in the vehicle:

  • On-board pseudonym self-issuance. A TPM creates and protects pseudonym keys; messages are signed with anonymous, unlinkable DAA signatures. (Larsen et al., 2021)
  • Hardware-enforced policies. A revocation index inside the TPM binds each pseudonym to two states:
    • Soft revocation: disable a specific pseudonym.
    • Hard revocation: disable all pseudonyms of a vehicle in one shot. (Larsen et al., 2021)
  • Privacy-preserving control plane. Vehicles register only cryptographic revocation hashes (“Proof of Registration”); no identity resolution is needed to revoke. (Larsen et al., 2021)

What we actually built

  • A full DAA pipeline (JOIN → self-issuance → sign/verify → soft/hard revocation) on V2X-grade hardware, and a PKI baseline (OpenSSL/ECDSA), both integrated with an ETSI-aligned CAM/DENM stack for like-for-like measurement. (Angelogianni et al., 2023)
  • A testbed exercising crypto cost, end-to-end latency under increasing message rates, pseudonym lifecycle, and revocation workflows. (Angelogianni et al., 2023)

Key results (what changed)

  • Revocation becomes practical. One signed broadcast from the RA triggers local (TPM-enforced) revocation, either a single pseudonym or the entire set. No CRLs, no identity resolution. (Larsen et al., 2021)(Angelogianni et al., 2023)
  • Self-issuance removes refill logistics. Pseudonyms are generated on-board under TPM policy; back-end load and connectivity assumptions drop dramatically. (Angelogianni et al., 2023)
  • Latency remains viable. Although DAA signatures are heavier than ECDSA in isolation, under realistic channel loads the network/stack dominates, and DAA ≈ PKI in end-to-end latency, so DAA is practically deployable for safety messaging. (Angelogianni et al., 2023)

Why this matters

  • Scalability: Eliminates bulk certificate manufacturing, distribution, and storage at fleet scale. (Giannetsos & Krontiris, 2019)
  • Privacy by design: Unlinkable, on-device credentials minimize tracking risk while preserving verifiability. (Larsen et al., 2021)
  • Operational security: A device kill-switch for misbehavior (hard revoke) with immediate effect, without revealing or resolving long-term identity. (Larsen et al., 2021)

References

  1. Securing V2X Communications for the Future: Can PKI Systems offer the answer?
    Thanassis Giannetsos, and Ioannis Krontiris
    In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES ’19), Canterbury, CA, United Kingdom, Oct 2019
  2. Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS
    Benjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, and Kenneth Goldman
    In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, Oct 2021
  3. Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security
    Anna Angelogianni, Ioannis Krontiris, and Thanassis Giannetsos
    In 2023 IEEE Vehicular Networking Conference (VNC), Oct 2023