ABSTRACT
In vehicular ad hoc networks (VANETs), regular changes in private communication pseudonyms are important to avoid illegal tracking of vehicles and to ensure their anonymity. In this paper, we propose a pseudonym change protocol based on the detection of trusted neighbors. In the absence of the latter, we opted for the attribution of a lifetime to pseudonyms. This protocol triggers the pseudonym change in several vehicles at the same time, a solution that improves vehicles anonymity. In this paper, we evaluate the performance of our protocol and compare our work to that based on a triggering system that changes pseudonyms with individual behavior after a limited lifetime.
- Florian Dötzer. Privacy Issues in Vehicular Ad Hoc Networks. In: Proceedings of the fifth international conference on privacy enhancing technologies (PET'05). Cavtat, Croatia; 2006. pp. 197--209. Google ScholarDigital Library
- Hubaux JP, Capkun S, Luo J. The security and privacy of smart vehicles. IEEE Security and Privacy 2004; 2(3):49--55. Google ScholarDigital Library
- Youngho Park, Kyung-Hyune Rhee, Chul Sur. A Secure and Location Assurance Protocol for Location-Aware Services in VANETs. 50th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 456--61, 2011. Google ScholarDigital Library
- Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P. On the Age of Pseudonyms in Mobile Ad Hoc Networks. INFOCOM, 2010 Proceedings IEEE, pp. 1--9, Mar. 2010. Google ScholarDigital Library
- Yuanyuan Pan, Jianqing Li. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications 36 (2013):1599--1609. Google ScholarDigital Library
- Mathews SM, Bevish Jinila Y. An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet. Electronics and Communication Systems (ICECS), 2014 International Conference on.Google Scholar
- Yeong-Sheng Chen, Tang-Te Lo, Chiu-Hua Lee, Ai-Chun Pang. Efficient pseudonym changing schemes for location privacy protection in VANETs. Connected Vehicles and Expo (ICCVE), 2013 International Conference on.Google Scholar
- Wang Ying, Jiujiang, China, Yang Shiyong. Protecting Location Privacy via Synchronously Pseudonym Changing in VANETs. Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. Google ScholarDigital Library
- Boualouache, Abdelwahab, Moussaoui Samira. S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs. Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on. Google ScholarDigital Library
- Xinyi Wang, Zheng Huang, Qiaoyan Wen, Hua Zhang. An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs. TENCON 2013 - 2013 IEEE Region 10 Conference (31194), 22--5, Oct. 2013.Google ScholarCross Ref
- Huang Lu, Jie Li, Mohsen Guizani. A Novel ID-based Authentication Framework with Adaptive Privacy Preservation for VANETs. Computing, Communication and Applications Conference (ComComAp), pp. 345--50, 2012.Google Scholar
- Song Guo, Deze Zeng, Yang Xiang. Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. Parallel and Distributed Systems, IEEE Transactions on, Issue Date: Nov. 2014.Google Scholar
- Dijiang Huang, Satyajayant Misra, Mayank Verma, Guoliang Xue, PACP. An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs. Intelligent Transportation Systems, IEEE Transaction on Volume 12, pp. 736--46, 2011. Google ScholarDigital Library
- Adetundji Adigun, Boucif Amar Bensaber, Ismail Biskri. Protocol of Change Pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), 2013 IEEE 38th Conference on. pp. 162--7, ISBN: 978-1-4799-0539-3, 21--24 October 2013, Sydney, NSW.Google Scholar
- http://www.omnetpp.org/ visited 25/05/2015Google Scholar
- http://veins.car2x.org/ visited 25/05/2015Google Scholar
- http://sumo.sourceforge.net/ visited 25/05/2015Google Scholar
Index Terms
- An Efficient Pseudonym Change Protocol Based on Trusted Neighbours for Privacy and Anonymity in VANETs
Recommendations
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing ...
A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security
MINES '10: Proceedings of the 2010 International Conference on Multimedia Information Networking and SecurityAs the radio frequency identification (RFID) technology continues to evolve and mature, RFID tags can be implemented in a wide range of applications. Due to the shared wireless medium between the RFID reader and the RFID tag, however, adversaries can ...
Pseudonym Based Mechanism for Sustaining Privacy in VANETs
CICSYN '09: Proceedings of the 2009 First International Conference on Computational Intelligence, Communication Systems and NetworksThis paper addresses the problem of sustaining the privacy of a vehicle in a vehicular ad hoc network (VANET). In a VANET, vehicles broadcast information as they move on the road. The location of a vehicle can estimated using localization techniques and ...
Comments