Peer-to-Peer Networking and Applications

, Volume 10, Issue 4, pp 1008–1020 | Cite as

TAPCS: Traffic-aware pseudonym changing strategy for VANETs

Article
  • 248 Downloads

Abstract

Location privacy is one of the main challenges in Vehicular Ad-hoc Networks (VANETs), since weak protection may hinder the public acceptance of this technology. Frequently changing pseudonyms are commonly accepted as a solution to protect the location privacy in VANETs. However, a simple pseudonym change is not enough to provide the required protection. Although many pseudonym changing strategies have been proposed to enhance the location privacy protection provided by this approach, the development of an effective strategy is not yet achieved. In this paper, we propose a new pseudonym changing strategy called Traffic-Aware Pseudonym Changing Strategy (TAPCS). The aim of this strategy is to provide an effective location privacy protection against the different types of pseudonyms linking attacks that can be performed by a strong passive adversary model. TAPCS is a distributed pseudonym changing strategy and is one of the strategies that use the radio silence technique. Unlike the existing distributed pseudonym changing strategies that use this technique, TAPCS aims to provide a high level of location privacy protection without impacting the safety in the VANETs. The analytical evaluation and simulation results demonstrate the effectiveness of the proposed strategy.

Keywords

Pseudonym changing Location Privacy Security VANETs 

References

  1. 1.
    Boualouache A, Moussaoui S (2014) S2si: A practical pseudonym changing strategy for location privacy in vanets. In: 2014 International conference on advanced networking distributed systems and applications (INDS). IEEE, pp 70–75Google Scholar
  2. 2.
    Boualouache A, Moussaoui S (2015) Urban pseudonym changing strategy for location privacy in vanets. Int J Ad Hoc Ubiquit Comput (in the press)Google Scholar
  3. 3.
    Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: Proceedings of the 4th European conference on security and privacy in ad-hoc and sensor networks, ESAS’07. Springer-Verlag, Berlin, Heidelberg, pp 129–141Google Scholar
  4. 4.
    Buttyan L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: Proceedings of the IEEE vehicular networking conference (VNC). Tokyo, Japan. IEEE, Los AlamitosGoogle Scholar
  5. 5.
    Collins K, Muntean G (2008) Route-based vehicular traffic management for wireless access in vehicular environments. In: Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, pp 1–5Google Scholar
  6. 6.
    Daz C (2005) Anonymity metrics revisited. In: Anonymous communication and its applications, 09.10. - 14.10.2005, Dagstuhl seminar proceedings, vol 05411Google Scholar
  7. 7.
    Eckhoff D, German R, Sommer C, Dressler F, Gansen T (2011) Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Commun Mag 49(11):126– 133CrossRefGoogle Scholar
  8. 8.
    Eckhoff D, Sommer C, Gansen T, German R, Dressler F (2010) Strong and affordable location privacy in vanets: Identity diffusion using time-slots and swapping. In: Vehicular networking conference (VNC), 2010 IEEE, pp174–181Google Scholar
  9. 9.
    Emara K, Woerndl W, Schlichter JH (2013) Vehicle tracking using vehicular network beacons. In: IEEE 14th International symposium on a world of wireless, mobile and multimedia networks, WoWMoM 2013, Madrid, Spain, pp 1–6. IEEEGoogle Scholar
  10. 10.
    Freudiger J, Raya M, Felegyhazi M, Papadimitratos P, Hubaux J (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)Google Scholar
  11. 11.
    Gerlach M, Gttler F (2007) Privacy in vanets using changing pseudonyms - ideal and real. In: VTC Spring. IEEE, pp 2521–2525Google Scholar
  12. 12.
    Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: Wireless communications and networking conference, 2005 IEEE, vol 2, pp 1187–1192Google Scholar
  13. 13.
    IEEE (2013) Ieee standard for wireless access in vehicular environments security services for applications and management messages. IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006), pp 1–289Google Scholar
  14. 14.
    Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T (2011) Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. Commun Surveys Tutor IEEE 13(4):584–616CrossRefGoogle Scholar
  15. 15.
    Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo simulation of urban mobility. Int J Adv Syst Measur 5(3):128–138Google Scholar
  16. 16.
    Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: Robust location privacy scheme for vanet. IEEE J Selected Areas Commun 1589Google Scholar
  17. 17.
    Lefevre S, Petit J, Bajcsy R, Laugier C, Kargl F (2013) Impact of v2x privacy strategies on intersection collision avoidance systems. In: Vehicular networking conference (VNC), 2013 IEEE, pp 71–78Google Scholar
  18. 18.
    Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in vanets. In: 2009 10th International symposium on pervasive systems, algorithms, and networks (ISPAN), pp 648–652. IEEEGoogle Scholar
  19. 19.
    Lu R, Lin X, Luan T, Liang X, Shen X (2012) Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE T Veh Technol 86–96Google Scholar
  20. 20.
    Marfia G, Roccetti M (2011) Vehicular congestion detection and short-term forecasting: A new model with results. IEEE Trans Veh Technol 60(7):2936–2948CrossRefGoogle Scholar
  21. 21.
    Milojevic M, Rakocevic V (2014) Distributed road traffic congestion quantification using cooperative vanets. In: 2014 13th Annual mediterranean ad hoc networking workshop (MED-HOC-NET). IEEE, pp 203–210Google Scholar
  22. 22.
    NHTSTA Preliminary statement of policy concerning automated vehicles (2013). Technical report, the U.S National Highway Traffic Safety Administration (NHTSTA)Google Scholar
  23. 23.
    Petit J, Schaub F, Feiri M, Kargl F (2014) Pseudonym schemes in vehicular networks: A survey. Commun Surveys Tutor IEEE PP(99):1–32Google Scholar
  24. 24.
    Rybicki J, Scheuermann B, Kiess W, Lochert C, Fallahi P, Mauve M (2007) Challenge: Peers on wheels-a road to new traffic information systems. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pp 215–221. ACMGoogle Scholar
  25. 25.
    Sadiku MN, Musa S (2013) Performance analysis of computer networks. SpringerGoogle Scholar
  26. 26.
    Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) Caravan: Providing location privacy for vanet. In: In embedded security in cars (ESCAR)Google Scholar
  27. 27.
    Sommer C, German R, Dressler F (2011) Bidirectionally coupled network and road traffic simulation for improved ivc analysis. IEEE Trans Mobile Comput 10(1):3–15CrossRefGoogle Scholar
  28. 28.
    Sommer C, Schmidt A, Chen Y, German R, Koch W, Dressler F (2010) On the feasibility of umts-based traffic information systems. Ad Hoc Netw 8(5):506–517CrossRefGoogle Scholar
  29. 29.
    Song JH, Wong V, Leung V (2009) Wireless location privacy protection in vehicular ad-hoc networks. In: IEEE International conference on communications, 2009. ICC ’09., pp 1–6Google Scholar
  30. 30.
    Song JH, Wong V, Leung V (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mobile Netw Appl 15(1):160–171CrossRefGoogle Scholar
  31. 31.
    Wang C, Tsai HM (2013) Detecting urban traffic congestion with single vehicle. In: 2013 International conference on connected vehicles and expo (ICCVE). IEEE, pp 233–240Google Scholar
  32. 32.
    Wasef A, Shen X (2010) Rep: Location privacy for vanets using random encryption periods. Mobile Netw Appl 15(1):172– 185CrossRefGoogle Scholar
  33. 33.
    Wiedersheim B, Ma Z, Kargl F, Papadimitratos P (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: Proceedings of the 7th international conference on Wireless on-demand network systems and services, WONS’10. IEEE Press, Piscataway, pp 176– 183Google Scholar
  34. 34.
    Wischoff L, Ebner A, Rohling H, Lott M, Halfmann R (2003) Sotis-a self-organizing traffic information system. In: Vehicular technology conference, 2003. VTC 2003-Spring. The 57th IEEE semiannual, vol 4. IEEE, pp 2442–2446Google Scholar
  35. 35.
    Ying B, Makrakis D, Mouftah H (2013) Dynamic mix-zone for location privacy in vehicular networks. Commun Lett IEEE 17(8):1524–1527CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science, RIIMA LaboratoryUSTHB UniversityAlgiersAlgeria

Personalised recommendations