RETRACTED ARTICLE: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks
- 390 Downloads
According to the recent studies, application related with safety associated with road networks must need verification of entities and messages. However, security of road network users like vehicles and drivers needs to be dealt with. Unique identity like pen names and certificates might get useful to ensure security. Pseudonym names and the special certificates are being considered as the basic building blocks to ensure security requirements for road networks. Nevertheless, apart from the seen advantages, road network communication might also generate certain privacy issues by giving opportunity to invader to track vehicles. One and for most basic technique is to solve this issue by means of using pen names by the vehicles and alter them time to time. Since executing the procedure of changing pen names has to increase overhead. By looking at such type of limitations, our given technique will produce top privacy level for the road network users by using dynamic pseudonyms based multiple mix zones scenario. This pseudonym based procedure will base upon vehicle’s acceleration, heading and displacement to execute dynamic pseudonym alteration. We have performed simulation by applying SUMO simulator. After having a detailed comparison with the current pseudonym change techniques, it has been verified that our given technique has shown enhanced performance in terms of acquiring top level privacy rate having few numbers of pseudonyms alteration; broad level of simulations and analysis has been elaborated the efficiency of the given technique.
KeywordsLocation privacy Road network Multiple mix-zones
This research has been funded by The National High Technology Research and Development Program of China (NO.2014AA123103, NO.2015AA124103) and National Natural Science Foundation of China (NO. 61401040, NO. 61372110).
Compliance with ethical standards
The author(s) declare that there is no conflict of interest regarding the publication of this manuscript.
- 4.Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., & Fang, Y. (2012). Traffic-aware multiple mix zone placement for protecting location privacy. In Proceedings of the IEEE INFOCOM (pp. 972–980).Google Scholar
- 5.Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communications, 79(1), 647–660.Google Scholar
- 9.Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., Unar, M. A., Ashraf, A., & Shaikh, R. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–521. doi: 10.1007/s11277-016-3906-4.
- 10.Buttyán, L., Holczer, T., Weimerskirch, A., & Whyte, W. (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In IEEE vehicular networking conference (pp. 1–8).Google Scholar
- 12.Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). Efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 1–20. doi: 10.1007/s11277-017-4022-9.
- 13.Arain, Q. A., Deng, Z., Memon, I., Zubedi, A., & Mangi, F. A. (2017). Map services based on multiple mix-zones with location privacy protection over road network. Wireless Personal Communications, 1–16. doi: 10.1007/s11277-017-4626-0.
- 14.Akhtar, R., Amin, N. U., Memon, I., & Shah, M. (2012). Implementation of secure AODV in MANET. In International conference on graphic and image processing (pp. 876803–876803).Google Scholar
- 15.Shiode, N., Li, C., Batty, M., Longley, P., & Maguire, D. (2002). The impact and penetration of location-based services. CASA Working Paper 50. Accessed June 23, 2010, http://www.casa.ucl.ac.uk/working_papers/paper50.pdf.
- 16.Memon, I., & Arain, Q. A. (2017). Dynamic distributed mobility management system based on multiple mix-zones over road networks. arXiv preprint arXiv:1706.02252.
- 17.Memon, I., & Arain, Q. A. (2017). Optimal placement of mix zones in road networks. arXiv preprint arXiv:1705.11104.
- 18.Palanisamy, B., & Liu, L. (2011). MobiMix: Protecting location privacy with mix zones over road networks. In Proceedings of the 27th IEEE international conference on data engineering (ICDE’11) (pp. 494–505).Google Scholar
- 19.Carianha, A. M., Barreto, L. P., & Lima, G. (2011). Improving location privacy in mix-zones for VANETS. In 2011 IEEE 30th international performance computing and communications conference (IPCCC) (pp. 1–6).Google Scholar
- 20.Freudiger, J., Shokri, R., & Hubaux, J. P. (August 5-7 2009). On the optimal placement of mix zones. In Privacy enhancing technologies symposium (PETS), Seattle (pp. 216–234).Google Scholar
- 23.Li, M., & Sampigethaya, K., et. al. (2006). Swing & swap: User-centric approaches towards maximizing location privacy. In WPES (pp. 19–28).Google Scholar
- 25.Humbert, M., & Manshaei, M. H., et.al. (2009). On the optimal placement of mix zones: A game-theoretic approach. In Proceeding of the 16th acm conference on computer and communications security (pp. 324–337).Google Scholar
- 26.Bibmeyer, N., Petit, J., & Bayarou, K. M. (2013). Copra: Conditional pseudonym resolution algorithm in VANETs. In 2013 10th annual conference on wireless on-demand network systems and services (WONS) (pp. 9–16).Google Scholar
- 29.Palanisamy, B., Ravichandran, S., Liu, L., Han, B., Lee, K., & Pu, C. (2013). Road network mix-zones for anonymous location based services. In Proceedings of the IEEE 29th international conference on data engineering (ICDE) (pp 1300–1303).Google Scholar
- 32.Kamenyi, D. M., Wang, Y., Zhang, F., & Memon, I. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.Google Scholar
- 33.Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi: 10.1109/ICCPS.2013.6893578.
- 35.Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: Dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications, 1–30. doi: 10.1007/s11042-016-4154-z.
- 36.Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems. doi: 10.1002/dac.3312.
- 37.Arain, Q. A., Memon, I., Deng, Z., Memon, M. H., Mangi, F. A., & Zubedi, A. (2017). Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools and Applications, 1–45. doi: 10.1007/s11042-017-4469-4.
- 38.Arain, Q. A., Memon, H., Memon, I., Memon, M. H., Shaikh, R. A., & Mangi, F. A. (2017). Intelligent travel information platform based on location base services to predict user travel behavior from user-generated GPS traces. International Journal of Computers and Applications, 39(3), 155–168. doi: 10.1080/1206212X.2017.1309222.
- 39.Arain, Q. A., Uqaili, M. A., Deng, Z., Memon, I., Jiao, J., Shaikh, M. A., & Arain, U. A. (2016). Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Personal Communications, 95(2), 411–428. doi: 10.1007/s11277-016-3900-x
- 40.Meyerowitz, J., & Choudhury, R. (2009). Hiding stars with fireworks: Location privacy through camouflage. In MOBICOM 2009.Google Scholar
- 41.U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http://www.census.gov/geo/www/tiger/.
- 42.Simulation of urban mobility (SUMO). Available at http://sumo.sourceforge.net.
- 43.U.S. Geological Survey. http://www.usgs.gov.
- 44.Chen, Y. S., Lo, T. T., Lee, C. H., & Pang, A. C. (2013). Efficient pseudonym changing schemes for location privacy protection in VANETs. In 2013 International Conference on Connected Vehicles and Expo (ICCVE). doi: 10.1109/ICCVE.2013.185.
- 45.Ying, B, & Makraki, D. (2015). Reputation-based pseudonym change for location privacy in vehicular networks. In IEEE ICC 2015-communications software, services and multimedia applicaations symposium.Google Scholar