Abstract
Road traffic information has become indispensable for routine vehicular communication but user location privacy an important issue which did not well addressed. An adversary may attack a user by tracking location in routine vehicular communication. Although, continuously changing pseudonyms is a promising solution to attain location privacy in road networks, it has been observed that changing pseudonym at improper time or location may again become a threat for location preservation. As a result, a number of techniques for pseudonym-change have been proposed to achieve location privacy on road networks but most of location based services depend upon speed, GPS position and direction angle services. Hence, sensitive information is periodically broadcasted in every 100-300 ms providing an opportunity to adversaries for accessing critical information and easily tracking vehicles. Moreover, existing methods such as RPCLP, EPCS and MODP for attaining location privacy in mix-zones environment have severely suffered due to large number of pseudonym-changes. To cope with these issues, we presented a Dynamic Pseudonym based Multiple Mix-zones (DPMM) strategy to acquire the highest level of accuracy and privacy. The concept of executing dynamic pseudonym change has been forwarded with respect to pseudonyms, velocity and direction of moving objects. We performed our simulations by using one SUMO simulator and analyzed results compared with existing pseudonym-changing techniques. Our simulation results outperformed various existing techniques and provided better results for achieving high privacy rate, requiring small number of pseudonym-change as well as providing best performance.
Similar content being viewed by others
References
Aad I, Hubaux JP, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Networking 16:791–802
Adigun A, Bensaber BA, Biskri I (2013) Protocol of change pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), IEEE 38th Conference on. pp. 162–7, Sydney, NSW. ISBN: 978-1-4799-0539-3
Ahmad J, Sajjad M, Jan Z, Mehmood I, Rho S, Baik SW (2016) Analysis of interaction trace maps for active authentication on smart devices. Multimed Tool Appl:1–19. doi:10.1007/s11042-016-3450-y
Akhtar R, Leng S, Memon I, Ali M, Zhang L (2014) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun. doi:10.1007/s11277-014-1996-4
Akhtar R, Leng S, Memon I, Ali M, Zhang L (2015) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun 80(1):85–96
Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. WWW Proceedings of the 17th international conference on World Wide Web 237–246. doi:10.1145/1367497.1367531
Bartolini I, Moscato V, Pensa RG, Penta A, Picariello A, Sansone C, Sapino ML (2016) Recommending multimedia visiting paths in cultural heritage applications. Multimed Tool Appl 75(7):3813–3842
Beresford A, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Computing 2(1):46–55
Bibmeyer N, Petit J, Bayarou KM (2013) Copra: conditional pseudonym resolution algorithm in VANETs. Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference on p 9–16
Bobek S, Nalepa GJ, Ligęza A, Adrian WT, Kaczor K (2014) Mobile context-based framework for threat monitoring in urban environment with social threat monitor. Multimed Tool Appl 1–22. doi:10.1007/s11042-014-2060-9
Buttyán L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: a practical pseudonym changing scheme for location privacy in vanets. IEEE Vehicular Networking Conference, p 1–8
Carianha AM, Barreto LP, Lima G (2011) Improving location privacy in mix-zones for VANETS. Performance Computing and Communications Conference (IPCCC), 2011 I.E. 30th International p 1–6
Chen Y-S, Lo T-T, Lee C-H, Pang A-C (2013)Efficient pseudonym changing schemes for location privacy protection in VANETs. 2013 International Conference on Connected Vehicles and Expo (ICCVE). doi:10.1109/ICCVE.2013.185
Chmiel W, Dańda J, Dziech A (2016) INSIGMA: an intelligent transportation system for urban mobility enhancement. Multimed Tool Appl 1–32. doi:10.1007/s11042-016-3367-5
Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13
Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux J-P, (2007) Mixzones for location privacy in vehicular networks. ACM Win-ITS
Freudiger J, Manshaei H, et al (2009a) On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM conference on computer and communications security(CCS). ACM, Chicago, p 324–337. doi:10.1145/1653662.1653702
Freudiger J, Shokri R, Hubaux JP (2009b) On the optimal placement of mix zones. Privacy Enhancing Technologies Symposium (PETS), Seattle p 216–234
Freudiger J, Manshaei MH, Boudec J-YL, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. INFOCOM, 2010 Proceedings IEEE, p 1–9
Freudiger J, Manshaei MH et al (2013) Non-cooperative location privacy. IEEE Transactions on Dependable and Secure Computing 10(2):84–98
Furini M, Tamanini V (2015) Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multime Tool Appl 74(21):9795–9825
Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. ICDCS Proceedings of the 25th IEEE International Conference on Distributed Computing Systems 620–629. doi:10.1109/ICDCS.2005.48
Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVE: anonymous location-based queries in distributed mobile systems. WWW Proceedings of the 16th international conference on World Wide Web 371–380. doi:10.1145/1242572.1242623
Gruteser M Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. MobiSys Proceedings of the 1st international conference on Mobile systems, applications and services 31–42. doi:10.1145/1066116.1189037
Guo S, Zeng D, Yang X (2014) Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Trans Parallel Distrib Syst 25(11):2794–2803. doi:10.1109/TPDS.2013.277
Gustav YH, Wang Y, Kamenyi DM, Zhang F, Memon I (2013) Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) p 433–436. doi:10.1109/ICCPS.2013.6893578
Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In IEEE global telecommunications conference, GLOBECOM p 1–5
Härri J, Filali F, Bonnet C (2009) Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Communications Surveys & Tutorials 11(4):19–41
Huang L, Matsuura K, Yamane H, Sezaki K (2006) Silent cascade: enhancing location privacy without communication QoS degradation. In Proceedings of SPC p 165–180
Humbert M, Manshaei MH, et al (2009) On the optimal placement of mix zones: a game-theoretic approach. In proceeding of the 16th ACM conference on Computer and Communications Security p 324–337
Jiang D, Wanga X, Guo L (2009) An optimization method of large-scale IP traffic matrix estimation. AEU Int J Electron Commun 64(7):685–689
Jiang D et al (2011) Joint time–frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547
Jiang D, Xu Z, Zhang P Zhu T (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl (40):292–306
Jiang D, Yao C, Xu Z et al (2015) Multi-scale anomaly detection for high-speed network traffic. Trans Emerg Telecommun Technol 26(3):308–317
Jiang D, Yuan Z, Zhang P, Miao L, Zhu T (2016a) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices.A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tool Appl 1–25. doi:10.1007/s11042-016-3402-6
D Jiang, L Shi, P Zhang, Ge X (2016b) QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issues. Multimed Tool Appl 1–22. doi:10.1007/s11042-015-3239-4
Kamenyi DM, Wang Y, Zhang F, Memon I (2013) Authenticated privacy preserving for continuous query in location based services. J Comput Inf Syst 9(24):9857–9864
Li J (2016) A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework. Multimed Tool Appl:1–25. doi:10.1007/s11042-016-3662-1
Li Y, Chen D (2015) A learning-based comprehensive evaluation model for traffic data quality in intelligent transportation systems. Multimed Tool Appl 1–16. doi:10.1007/s11042-015-2676-4
Li M, Sampigethaya K, et al (2006) Swing & swap: user-centric approaches towards maximizing location privacy. WPES p 19–28
Liu X, Zhao H, Pan M, Yue H, Li X, Fang Y (2012) Traffic-aware multiple mix zone placement for protecting location privacy. Proc - IEEE INFOCOM p 972–980
Liu Y, He Z, Zhao S, Wang L (2016).An efficient anonymous authentication protocol using batch operations for VANETs. Multimed Tool Appl 1–21.doi:10.1007/s11042-016-3614-9
Lu R, Lin X, Luan TH, Liang X, Shen XS (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86–96
Lu Y, Li L, Peng H, Yang Y (2015) An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed Tool Appl 1–15. doi:10.1007/s11042-015-3166-4
Martinez FJ, Toh CK, Cano J-C, Calafate CT, Manzoni P (2011) A survey and comparative study of simulators for vehicular ad hoc networks. Wirel Commun Mob Comput 11:813–828
Mazurczyk W, Szaga P, Szczypiorski K (2014) Using transcoding for hidden communication in IP telephony. Multimed Tool Appl 70(3):2139–2216
Memon I (2015a) Authentication User’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel Pers Commun 82(3):1585–1600
Memon I (2015b) A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wirel Pers Commun 85(3):1167–1191
Memon I, Arain QA (2016) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web. 1–33. doi:10.1007/s11280-016-0403-3
Memon I, Mohammed MR, Akhtar R, Memon H, Memon MH, Shaikh RA (2014) Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel Pers Commun 79(1):661–686
Memon I, Chen L, Majid A, Lv M, Hussain I, Chen G (2015a) Travel recommendation using geo-tagged photos in social Media for Tourist. Wirel Pers Commun 80(4):1347–1362
Memon I, Hussain I, Akhtar R, Chen G (2015b) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487–1508
Memon MH, Li J-P, Memon I, Arain QA (2016) GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimed Tool Appl 1–35. doi:10.1007/s11042-016-3834-z
Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks:location privacy through camouflage in MOBICOM Proceedings of the 15th annual international conference on Mobile computing and networking 345–356. doi:10.1145/1614320.1614358
Milutinović M, Labus A, Stojiljković V, Bogdanović Z, Despotović-Zrakić M (2015) Designing a mobile language learning system based on lightweight learning objects. Multimed Tool Appl 74(3):903–935
Mishra T, Garg D, Gore MM (2011) A publish/subscribe communication infrastructure for VANET applications. In IEEE advanced information networking and applications (WAINA) workshops p 442–446
Moghraoui K (2015) An efficient pseudonym change protocol based on trusted neighbours for privacy and anonymity in VANETs p 93–99
Mokbel M, Chow C, Aref W (2006) The new casper: query processing for location services without compromising privacy. In VLDB Proceedings of the 32nd international conference on Very large data bases 763–774
Muraleedharan R, Osadciw LA (2009) Cognitive security protocol for sensor based VANET using swarm intelligence. In 43th IEEE Asilomar signals, systems and computers conference p 288–290
Ohta T, Ogasawara K, Kakuda Y (2010) End-to-end transfer rate adjustment mechanism for VANET. In 3rd Dependability conference, DEPEND p 1–6
Palanisamy B Liu L (2011) MobiMix: protecting location privacy with mix zones over road networks. Proc. of 27th IEEE International Conference on Data Engineering (ICDE’11) p 494–505
Palanisamy B, Ravichandran S, Liu L, Han B, Lee K, Pu C (2013) Road network mix-zones for anonymous location based services. In: Proceedings of the IEEE 29th international conference on data engineering (ICDE) p 1300–1303
Pan Y, Li J (2012) An analysis of anonymity for cooperative pseudonym change scheme in one-dimensional vanets. Computer Supported Cooperative Work in Design (CSCWD), 2012 I.E. 16th International Conference on p 251–257
Pan Y, Li J (2013a) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36:1599–1609
Pan Y, Li J (2013b) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36(6):1599–1609
Park KC, Shin H, Park WH, Lim JI (2015) New detection method and countermeasure of cyber attacks in mix networks. Multimed Tool Appl 74(16):6509–6518
Parno B, Perrig A (2005) Challenges in securing vehicular networks. In: Hot topics in networks (HotNets-IV) College Park, Maryland, November 2005
Sadhukhan P, Chatterjee N, Das A, Das PK (2010) A scalable location-based services infrastructure combining gps and bluetooth based positioning for providing services in ubiquitous environment. IMSAA 2010, p 15–17
Saini M, Atrey PK, Mehrotra S, Kankanhalli M (2014) W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multimed Tool Appl 68(1):135–158
Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: Providing location privacy for VANET. In Proceedings of Embedded Security in Cars (ESCAR) 8
Shen J, Cai Y-J, Luo L (2015) A context-aware mobile web middleware for service of surveillance video with privacy. Multimed Tool Appl 74(18):8025–8051
Shiode N, Li C, Batty M, Longley P, Maguire D (2002) The impact and penetration of location-based services. CASA Working Paper 50. http://www.casa.ucl.ac.uk/working_papers/paper50.pdf. Accessed 23 Jun 2010
Sichitiu ML, Kini M (2008) Inter-vehicle communication system: a survey. IEEE Communications Surveys and Tutorials 10(2):88–105
Simulation of urban mobility (SUMO). Available at http://sumo.sourceforge.net
Soyoung P, Cliff ZC (2008) Reliable traffic information propagation in vehicular ad hoc networks. IEEE Sarnoff Symposium Conference p 1–6
Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications 8(6):1108–1121015.
Tapascologne Project [Online]. Available: http://sourceforge.net/apps/mediawiki/sumo/index.php?title=TAPASCologne
U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http://www.census.gov/geo/www/tiger/
U.S. Geological Survey http://www.usgs.gov
Virrantaus K, Markkula J, Garmash A, Terziyan V, Veijalainen J, Katanosov A et al (2001) Developing GIS-supported location-based services. In Proc. of the international conference on Web information systems engineering 2:66–75
Wang T, Liu L (2009) Privacy-aware mobile services over road networks in VLDB Endowment Hompage archive 2(1):1042–1053. doi:10.14778/1687627.1687745
Wu B, Chen J, Wu J, Cardei M (2007) A survey on attacks and countermeasures in mobile ad hoc networks. Springer Journal of Wireless Network Security 2:103–135
Ying B, Makraki D (2015) Reputation-based pseudonym change for location privacy in vehicular networks. IEEE ICC 2015- International Conference on Communications (ICC) 7041–7046. doi:10.1109/ICC.2015.7249449
Ying B, Makrakis D, Mouftah HT (2013) Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Commun Lett 17(8)
Acknowledgement
We thank reviewers for their valuable comments/suggestions on the early version of the paper. Imran Memon & Qasim Ali contributed equally to this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The author(s) declare that there is no conflict of interest regarding the publication of this manuscript.
Rights and permissions
About this article
Cite this article
Memon, I., Ali, Q., Zubedi, A. et al. DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl 76, 24359–24388 (2017). https://doi.org/10.1007/s11042-016-4154-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4154-z