Skip to main content
Log in

DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Road traffic information has become indispensable for routine vehicular communication but user location privacy an important issue which did not well addressed. An adversary may attack a user by tracking location in routine vehicular communication. Although, continuously changing pseudonyms is a promising solution to attain location privacy in road networks, it has been observed that changing pseudonym at improper time or location may again become a threat for location preservation. As a result, a number of techniques for pseudonym-change have been proposed to achieve location privacy on road networks but most of location based services depend upon speed, GPS position and direction angle services. Hence, sensitive information is periodically broadcasted in every 100-300 ms providing an opportunity to adversaries for accessing critical information and easily tracking vehicles. Moreover, existing methods such as RPCLP, EPCS and MODP for attaining location privacy in mix-zones environment have severely suffered due to large number of pseudonym-changes. To cope with these issues, we presented a Dynamic Pseudonym based Multiple Mix-zones (DPMM) strategy to acquire the highest level of accuracy and privacy. The concept of executing dynamic pseudonym change has been forwarded with respect to pseudonyms, velocity and direction of moving objects. We performed our simulations by using one SUMO simulator and analyzed results compared with existing pseudonym-changing techniques. Our simulation results outperformed various existing techniques and provided better results for achieving high privacy rate, requiring small number of pseudonym-change as well as providing best performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Aad I, Hubaux JP, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Networking 16:791–802

    Article  Google Scholar 

  2. Adigun A, Bensaber BA, Biskri I (2013) Protocol of change pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), IEEE 38th Conference on. pp. 162–7, Sydney, NSW. ISBN: 978-1-4799-0539-3

  3. Ahmad J, Sajjad M, Jan Z, Mehmood I, Rho S, Baik SW (2016) Analysis of interaction trace maps for active authentication on smart devices. Multimed Tool Appl:1–19. doi:10.1007/s11042-016-3450-y

  4. Akhtar R, Leng S, Memon I, Ali M, Zhang L (2014) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun. doi:10.1007/s11277-014-1996-4

    Google Scholar 

  5. Akhtar R, Leng S, Memon I, Ali M, Zhang L (2015) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun 80(1):85–96

    Article  Google Scholar 

  6. Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. WWW Proceedings of the 17th international conference on World Wide Web 237–246. doi:10.1145/1367497.1367531

  7. Bartolini I, Moscato V, Pensa RG, Penta A, Picariello A, Sansone C, Sapino ML (2016) Recommending multimedia visiting paths in cultural heritage applications. Multimed Tool Appl 75(7):3813–3842

    Article  Google Scholar 

  8. Beresford A, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Computing 2(1):46–55

    Article  Google Scholar 

  9. Bibmeyer N, Petit J, Bayarou KM (2013) Copra: conditional pseudonym resolution algorithm in VANETs. Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference on p 9–16

  10. Bobek S, Nalepa GJ, Ligęza A, Adrian WT, Kaczor K (2014) Mobile context-based framework for threat monitoring in urban environment with social threat monitor. Multimed Tool Appl 1–22. doi:10.1007/s11042-014-2060-9

  11. Buttyán L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: a practical pseudonym changing scheme for location privacy in vanets. IEEE Vehicular Networking Conference, p 1–8

  12. Carianha AM, Barreto LP, Lima G (2011) Improving location privacy in mix-zones for VANETS. Performance Computing and Communications Conference (IPCCC), 2011 I.E. 30th International p 1–6

  13. Chen Y-S, Lo T-T, Lee C-H, Pang A-C (2013)Efficient pseudonym changing schemes for location privacy protection in VANETs. 2013 International Conference on Connected Vehicles and Expo (ICCVE). doi:10.1109/ICCVE.2013.185

  14. Chmiel W, Dańda J, Dziech A (2016) INSIGMA: an intelligent transportation system for urban mobility enhancement. Multimed Tool Appl 1–32. doi:10.1007/s11042-016-3367-5

  15. Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13

    Article  Google Scholar 

  16. Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux J-P, (2007) Mixzones for location privacy in vehicular networks. ACM Win-ITS

  17. Freudiger J, Manshaei H, et al (2009a) On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM conference on computer and communications security(CCS). ACM, Chicago, p 324–337. doi:10.1145/1653662.1653702

  18. Freudiger J, Shokri R, Hubaux JP (2009b) On the optimal placement of mix zones. Privacy Enhancing Technologies Symposium (PETS), Seattle p 216–234

  19. Freudiger J, Manshaei MH, Boudec J-YL, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. INFOCOM, 2010 Proceedings IEEE, p 1–9

  20. Freudiger J, Manshaei MH et al (2013) Non-cooperative location privacy. IEEE Transactions on Dependable and Secure Computing 10(2):84–98

    Article  Google Scholar 

  21. Furini M, Tamanini V (2015) Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multime Tool Appl 74(21):9795–9825

    Article  Google Scholar 

  22. Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. ICDCS Proceedings of the 25th IEEE International Conference on Distributed Computing Systems 620–629. doi:10.1109/ICDCS.2005.48

  23. Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVE: anonymous location-based queries in distributed mobile systems. WWW Proceedings of the 16th international conference on World Wide Web 371–380. doi:10.1145/1242572.1242623

  24. Gruteser M Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. MobiSys Proceedings of the 1st international conference on Mobile systems, applications and services 31–42. doi:10.1145/1066116.1189037

  25. Guo S, Zeng D, Yang X (2014) Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Trans Parallel Distrib Syst 25(11):2794–2803. doi:10.1109/TPDS.2013.277

  26. Gustav YH, Wang Y, Kamenyi DM, Zhang F, Memon I (2013) Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) p 433–436. doi:10.1109/ICCPS.2013.6893578

  27. Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In IEEE global telecommunications conference, GLOBECOM p 1–5

  28. Härri J, Filali F, Bonnet C (2009) Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Communications Surveys & Tutorials 11(4):19–41

    Article  Google Scholar 

  29. Huang L, Matsuura K, Yamane H, Sezaki K (2006) Silent cascade: enhancing location privacy without communication QoS degradation. In Proceedings of SPC p 165–180

  30. Humbert M, Manshaei MH, et al (2009) On the optimal placement of mix zones: a game-theoretic approach. In proceeding of the 16th ACM conference on Computer and Communications Security p 324–337

  31. Jiang D, Wanga X, Guo L (2009) An optimization method of large-scale IP traffic matrix estimation. AEU Int J Electron Commun 64(7):685–689

    Article  Google Scholar 

  32. Jiang D et al (2011) Joint time–frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547

    Article  Google Scholar 

  33. Jiang D, Xu Z, Zhang P Zhu T (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl (40):292–306

  34. Jiang D, Yao C, Xu Z et al (2015) Multi-scale anomaly detection for high-speed network traffic. Trans Emerg Telecommun Technol 26(3):308–317

    Article  Google Scholar 

  35. Jiang D, Yuan Z, Zhang P, Miao L, Zhu T (2016a) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices.A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tool Appl 1–25. doi:10.1007/s11042-016-3402-6

  36. D Jiang, L Shi, P Zhang, Ge X (2016b) QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issues. Multimed Tool Appl 1–22. doi:10.1007/s11042-015-3239-4

  37. Kamenyi DM, Wang Y, Zhang F, Memon I (2013) Authenticated privacy preserving for continuous query in location based services. J Comput Inf Syst 9(24):9857–9864

    Google Scholar 

  38. Li J (2016) A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework. Multimed Tool Appl:1–25. doi:10.1007/s11042-016-3662-1

  39. Li Y, Chen D (2015) A learning-based comprehensive evaluation model for traffic data quality in intelligent transportation systems. Multimed Tool Appl 1–16. doi:10.1007/s11042-015-2676-4

  40. Li M, Sampigethaya K, et al (2006) Swing & swap: user-centric approaches towards maximizing location privacy. WPES p 19–28

  41. Liu X, Zhao H, Pan M, Yue H, Li X, Fang Y (2012) Traffic-aware multiple mix zone placement for protecting location privacy. Proc - IEEE INFOCOM p 972–980

  42. Liu Y, He Z, Zhao S, Wang L (2016).An efficient anonymous authentication protocol using batch operations for VANETs. Multimed Tool Appl 1–21.doi:10.1007/s11042-016-3614-9

  43. Lu R, Lin X, Luan TH, Liang X, Shen XS (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86–96

    Article  Google Scholar 

  44. Lu Y, Li L, Peng H, Yang Y (2015) An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed Tool Appl 1–15. doi:10.1007/s11042-015-3166-4

  45. Martinez FJ, Toh CK, Cano J-C, Calafate CT, Manzoni P (2011) A survey and comparative study of simulators for vehicular ad hoc networks. Wirel Commun Mob Comput 11:813–828

    Article  Google Scholar 

  46. Mazurczyk W, Szaga P, Szczypiorski K (2014) Using transcoding for hidden communication in IP telephony. Multimed Tool Appl 70(3):2139–2216

    Article  Google Scholar 

  47. Memon I (2015a) Authentication User’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel Pers Commun 82(3):1585–1600

    Article  Google Scholar 

  48. Memon I (2015b) A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wirel Pers Commun 85(3):1167–1191

    Article  Google Scholar 

  49. Memon I, Arain QA (2016) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web. 1–33. doi:10.1007/s11280-016-0403-3

  50. Memon I, Mohammed MR, Akhtar R, Memon H, Memon MH, Shaikh RA (2014) Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel Pers Commun 79(1):661–686

    Article  Google Scholar 

  51. Memon I, Chen L, Majid A, Lv M, Hussain I, Chen G (2015a) Travel recommendation using geo-tagged photos in social Media for Tourist. Wirel Pers Commun 80(4):1347–1362

    Article  Google Scholar 

  52. Memon I, Hussain I, Akhtar R, Chen G (2015b) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487–1508

    Article  Google Scholar 

  53. Memon MH, Li J-P, Memon I, Arain QA (2016) GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimed Tool Appl 1–35. doi:10.1007/s11042-016-3834-z

  54. Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks:location privacy through camouflage in MOBICOM Proceedings of the 15th annual international conference on Mobile computing and networking 345–356. doi:10.1145/1614320.1614358

  55. Milutinović M, Labus A, Stojiljković V, Bogdanović Z, Despotović-Zrakić M (2015) Designing a mobile language learning system based on lightweight learning objects. Multimed Tool Appl 74(3):903–935

    Article  Google Scholar 

  56. Mishra T, Garg D, Gore MM (2011) A publish/subscribe communication infrastructure for VANET applications. In IEEE advanced information networking and applications (WAINA) workshops p 442–446

  57. Moghraoui K (2015) An efficient pseudonym change protocol based on trusted neighbours for privacy and anonymity in VANETs p 93–99

  58. Mokbel M, Chow C, Aref W (2006) The new casper: query processing for location services without compromising privacy. In VLDB Proceedings of the 32nd international conference on Very large data bases 763–774

  59. Muraleedharan R, Osadciw LA (2009) Cognitive security protocol for sensor based VANET using swarm intelligence. In 43th IEEE Asilomar signals, systems and computers conference p 288–290

  60. Ohta T, Ogasawara K, Kakuda Y (2010) End-to-end transfer rate adjustment mechanism for VANET. In 3rd Dependability conference, DEPEND p 1–6

  61. Palanisamy B Liu L (2011) MobiMix: protecting location privacy with mix zones over road networks. Proc. of 27th IEEE International Conference on Data Engineering (ICDE’11) p 494–505

  62. Palanisamy B, Ravichandran S, Liu L, Han B, Lee K, Pu C (2013) Road network mix-zones for anonymous location based services. In: Proceedings of the IEEE 29th international conference on data engineering (ICDE) p 1300–1303

  63. Pan Y, Li J (2012) An analysis of anonymity for cooperative pseudonym change scheme in one-dimensional vanets. Computer Supported Cooperative Work in Design (CSCWD), 2012 I.E. 16th International Conference on p 251–257

  64. Pan Y, Li J (2013a) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36:1599–1609

    Article  Google Scholar 

  65. Pan Y, Li J (2013b) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36(6):1599–1609

    Article  MathSciNet  Google Scholar 

  66. Park KC, Shin H, Park WH, Lim JI (2015) New detection method and countermeasure of cyber attacks in mix networks. Multimed Tool Appl 74(16):6509–6518

    Article  Google Scholar 

  67. Parno B, Perrig A (2005) Challenges in securing vehicular networks. In: Hot topics in networks (HotNets-IV) College Park, Maryland, November 2005

  68. Sadhukhan P, Chatterjee N, Das A, Das PK (2010) A scalable location-based services infrastructure combining gps and bluetooth based positioning for providing services in ubiquitous environment. IMSAA 2010, p 15–17

  69. Saini M, Atrey PK, Mehrotra S, Kankanhalli M (2014) W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multimed Tool Appl 68(1):135–158

    Article  Google Scholar 

  70. Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: Providing location privacy for VANET. In Proceedings of Embedded Security in Cars (ESCAR) 8

  71. Shen J, Cai Y-J, Luo L (2015) A context-aware mobile web middleware for service of surveillance video with privacy. Multimed Tool Appl 74(18):8025–8051

    Article  Google Scholar 

  72. Shiode N, Li C, Batty M, Longley P, Maguire D (2002) The impact and penetration of location-based services. CASA Working Paper 50. http://www.casa.ucl.ac.uk/working_papers/paper50.pdf. Accessed 23 Jun 2010

  73. Sichitiu ML, Kini M (2008) Inter-vehicle communication system: a survey. IEEE Communications Surveys and Tutorials 10(2):88–105

    Article  Google Scholar 

  74. Simulation of urban mobility (SUMO). Available at http://sumo.sourceforge.net

  75. Soyoung P, Cliff ZC (2008) Reliable traffic information propagation in vehicular ad hoc networks. IEEE Sarnoff Symposium Conference p 1–6

  76. Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications 8(6):1108–1121015.

  77. Tapascologne Project [Online]. Available: http://sourceforge.net/apps/mediawiki/sumo/index.php?title=TAPASCologne

  78. U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http://www.census.gov/geo/www/tiger/

  79. U.S. Geological Survey http://www.usgs.gov

  80. Virrantaus K, Markkula J, Garmash A, Terziyan V, Veijalainen J, Katanosov A et al (2001) Developing GIS-supported location-based services. In Proc. of the international conference on Web information systems engineering 2:66–75

  81. Wang T, Liu L (2009) Privacy-aware mobile services over road networks in VLDB Endowment Hompage archive 2(1):1042–1053. doi:10.14778/1687627.1687745

  82. Wu B, Chen J, Wu J, Cardei M (2007) A survey on attacks and countermeasures in mobile ad hoc networks. Springer Journal of Wireless Network Security 2:103–135

    Article  Google Scholar 

  83. Ying B, Makraki D (2015) Reputation-based pseudonym change for location privacy in vehicular networks. IEEE ICC 2015- International Conference on Communications (ICC) 7041–7046. doi:10.1109/ICC.2015.7249449

  84. Ying B, Makrakis D, Mouftah HT (2013) Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Commun Lett 17(8)

Download references

Acknowledgement

We thank reviewers for their valuable comments/suggestions on the early version of the paper. Imran Memon & Qasim Ali contributed equally to this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imran Memon.

Ethics declarations

Competing interests

The author(s) declare that there is no conflict of interest regarding the publication of this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memon, I., Ali, Q., Zubedi, A. et al. DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl 76, 24359–24388 (2017). https://doi.org/10.1007/s11042-016-4154-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4154-z

Keywords

Navigation