Skip to main content

Advertisement

Log in

Privacy and safety improvement of VANET data via a safety-related privacy scheme

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Vehicular Ad-hoc NETwork (VANET) safety applications allow vehicles to exchange messages with surrounding vehicles periodically to improve the contextual awareness of the drivers about the driving environment which significantly enhances traffic safety. However, these messages usually contain sensitive information such as the Spatio-temporal information of each vehicle which might be exploited by malicious entities for various purposes (e.g. monitoring the vehicle for a long period and breaching the driver’s privacy). Researchers have proposed different schemes to enhance the privacy level of drivers and their vehicles alike. However, most of the existing schemes have a negative impact on safety applications; they stop broadcasting messages for a period which increases the chance of accidents. In this paper, we propose a Safety-related Privacy Scheme (SRPS) that enhances both the privacy and safety of VANET safety applications by reducing silent periods without degrading the privacy level. While the vehicle continues monitoring neighbour vehicles if an accident is expected, it exits the silent period and starts sharing its location with its neighbour vehicles. The SRPS consists of two algorithms based on the status of the vehicle (i.e. silent vs. active). These algorithms use a multi-target tracking algorithm to search for an effective context to change pseudonyms and avoid potential accidents. Four simulators are used to implement SRPS. The latter has been compared with five pseudonym-changing schemes (PPC, RSP, CSP, SLOW, and CAPS). The simulation results indicate that SRPS achieves an efficient balance between security, privacy, and safety when compared to the other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig.7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

Notes

  1. https://sumo.dlr.de/docs/netconvert.html.

  2. https://sumo.dlr.de/docs/polyconvert.html.

  3. https://sumo.dlr.de/docs/Tools/Trip.html.

  4. https://github.com/karim-emara/PREXT.

References

  1. Smith, M. N.: The number of cars worldwide is set to double by 2040. In: World Economic Forum, Geneva, 2016, Available: https://www.weforum.org/agenda/2016/04/the-number-of-cars-worldwide-is-set-to-double-by-2040, Accessed on: 22/11/2019

  2. W. H. O. (WHO) Road traffic injuries, United Nation, 21/06/2021, Available: https://www.who.int/news-room/fact-sheets/detail/road-traffic-injuries, Accessed on: 11/03/2022

  3. Vaibhav, A., Shukla, D., Das, S., Sahana, S., Johri, P.: Security challenges, authentication, application and trust models for vehicular ad hoc network-a survey. Int. J. Wirel. Microw. Technol. (IJWMT) 7(3), 36–48 (2017)

    Google Scholar 

  4. Sae, D: J2735 dedicated short range communications (dsrc) message set dictionary. Society of Automotive Engineers, DSRC Committee, (2009)

  5. Yang, F., Wang, S., Li, J., Liu, Z., Sun, Q.: An overview of internet of vehicles. China Commun. 11(10), 1–15 (2014)

    Article  Google Scholar 

  6. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)

    Article  Google Scholar 

  7. Soleymani, S.A., Goudarzi, S., Anisi, M.H., Zareei, M., Abdullah, A.H., Kama, N.J.V.C.: A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh. Commun. 29, 100335 (2021)

    Google Scholar 

  8. Goudarzi, S., et al.: A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Netw. 128, 102782 (2022)

    Article  Google Scholar 

  9. Stankovic, J.A.: Research directions for the internet of things. IEEE Internet Things J. 1(1), 3–9 (2014)

    Article  Google Scholar 

  10. Litman, T.A.: Pay-as-you-drive vehicle insurance: implementation, benefits, and costs, (2006)

  11. ETSI, T.: Intelligent transport systems (ITS); vehicular communications; basic set of applications; definitions, ETSI TR 102 6382009.

  12. Ahmed-Zaid, F., et al.: Vehicle safety communications–applications (VSC-A) Final Report: Appendix Volume 3 Security," (2011)

  13. Mundhe, P., Verma, S., Venkatesan, S.J.C.S.R.: A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput. Sci. Rev. 41, 100411 (2021)

    Article  Google Scholar 

  14. Benz, T.: PRECIOSA: V2X Privacy Issue Analysis IST-224201, 2009, Available: https://cordis.europa.eu/docs/projects/cnect/1/224201/080/deliverables/001-PRECIOSAD1V2XPrivacyIssuesAnalysisv41.pdf, Accessed on: 12 Feb 2009 (2009)

  15. Jiang, Y., Ge, S., Shen, X.J.I.A.: AAAS: an anonymous authentication scheme based on group signature in VANETs. IEEE Access 8, 98986–98998 (2020)

    Article  Google Scholar 

  16. Kargl, F., Petit, J.: Security and privacy in vehicular networks. In: Vehicular Communications and Networks: Elsevier, pp. 171–190 (2015)

  17. Benarous, L., Kadri, B., Bitam, S., Mellouk, A.: Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET. Int. J. Commun. Syst. 33(10), e4087 (2020)

    Article  Google Scholar 

  18. Zhang, K., Liang, X., Lu, R., Shen, X.: Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1(5), 372–383 (2014)

    Article  Google Scholar 

  19. Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 176–183: IEEE (2010)

  20. Emara, K., Woerndl, W., Schlichter, J.: Vehicle tracking using vehicular network beacons. In: 2013 IEEE 14th International Symposium on “A World of Wireless, Mobile and Multimedia Networks (WoWMoM)”, pp. 1–6: IEEE (2013)

  21. J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux, "Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), no. LCA-CONF-2007–016 (2007)

  22. Shaleesh, I.S., Almohammedi, A.A., Mohammad, N.I., Ahmad, A.A., Shepelev, V.: Cooperation and radio silence strategy in mix zone to protect location privacy of vehicle in VANET. Tikrit J. Eng. Sci. 28(1), 31–39 (2021)

    Article  Google Scholar 

  23. Li, Y., Yin, Y., Chen, X., Wan, J., Jia, G., Sha, K.: A secure dynamic mix zone pseudonym changing scheme based on traffic context prediction. IEEE Transactions on Intelligent Transportation Systems..(2021)

  24. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET," Washington Univ Seattle Dept Of Electrical Engineering, (2005)

  25. Didouh, A., El Hillali, Y., Rivenq, A., Labiod, H.J.E.: Novel centralized pseudonym changing scheme for location privacy in V2X communication. Energies 15(3), 692 (2022)

    Article  Google Scholar 

  26. Emara, K., Woerndl, W., Schlichter, J.: CAPS: context-aware privacy scheme for VANET safety applications. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p. 21: ACM (2015)

  27. Emara, K., Woerndl, W., Schlichter, J.: Context-based pseudonym changing scheme for vehicular adhoc networks. arXiv preprint arXiv:1607.07656, (2016)

  28. Xin, W., Moonam, H.M., Petit, J., Whyte, W.: Towards a balance between privacy and safety: microsimulation framework for assessing silence-based pseudonym-change schemes. Transp. Res. Rec. 2673(2), 71–84 (2019)

    Article  Google Scholar 

  29. Dok, H., Fu, H., Echevarria, R., Weerasinghe, H.: Privacy issues of vehicular ad-hoc networks. Int. J. Future Gener. Commun. Netw. 3(1), 17–32 (2010)

    Google Scholar 

  30. Gerlach, M.: Assessing and improving privacy in VANETs. ESCAR, Embedded Security in Cars, (2006)

  31. Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 19–28: ACM (2006)

  32. Liao, J., Li, J.: Effectively changing pseudonyms for privacy protection in vanets. In: 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 648–652: IEEE (2009)

  33. Buttyán, L., Holczer, T., Weimerskirch, A., Whyte, W.: Slow: a practical pseudonym changing scheme for location privacy in vanets. In: Vehicular Networking Conference (VNC), IEEE, 2009, pp. 1–8: IEEE (2009)

  34. Emara, K.A.A.E.-S.: Safety-Aware Location Privacy in Vehicular Ad-Hoc Networks. Technische Universität München, Munich (2016)

    Google Scholar 

  35. Guo, J., Balon, N.: Vehicular Ad Hoc Networks and Dedicated Short-Range Communication. University of Michigan, Ann Arbor (2006)

    Google Scholar 

  36. Vegni, A.M., Biagi, M., Cusani, R.: Smart vehicles, technologies and main applications in vehicular ad hoc networks. In: Vehicular Technologies-Deployment and Applications: IntechOpen, (2013)

  37. Schoch, E., Kargl, F.: On the efficiency of secure beaconing in vanets. In: Proceedings of the third ACM conference on Wireless network security, pp. 111–116: ACM (2010)

  38. Bai, F., Elbatt, T., Hollan, G., Krishnan, H., Sadekar, V.: Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In: Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pp. 1–25: San Francisco, CA, USA (2006)

  39. Djahel, S., Ghamri-Doudane, Y.: A robust congestion control scheme for fast and reliable dissemination of safety messages in VANETs. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2264–2269: IEEE (2012)

  40. CAMP, V. J. U. D. o. T.: Washington, DC, Tech. Rep. DOT HS 809 859, Vehicle safety communications project task 3 final report-identify intelligent vehicle safety applications enabled by dsrc. (2005)

  41. Studer, A., Luk, M., Perrig, A.: Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In: 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, pp. 422–432: IEEE (2007)

  42. Wei, L., Cui, J., Xu, Y., Cheng, J., Zhong, H.: Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs. IEEE Trans. Inf. Forensics Secur. 16, 1681–1695 (2020)

    Article  Google Scholar 

  43. Khodaei, M., Papadimitratos, P.: Evaluating on-demand pseudonym acquisition policies in vehicular communication systems. In: Proceedings of the first international workshop on internet of vehicles and vehicles of internet, pp. 7–12: ACM (2016)

  44. Studer, A., Shi, E., Bai, F., Perrig, A.: TACKing together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON'09, 2009, pp. 1–9: IEEE (2009)

  45. Tahir, M.N., Katz, M., Rashid, U.: Analysis of VANET wireless networking technologies in realistic environments. In: 2021 IEEE radio and wireless symposium (RWS), pp. 123–125: IEEE (2021)

  46. Yang, W.: Security in vehicular ad hoc networks (vanets). In: Wireless Network Security: Springer, 2013, pp. 95–128 (2013)

  47. Leinmüller, T., et al.: Sevecom-secure vehicle communication. In: IST Mobile and Wireless Communication Summit, 2006, no. POST_TALK (2006)

  48. Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: International Conference on Security in Pervasive Computing, pp. 179–192: Springer (2005)

  49. (2016, 02/02/2020). What are your main concerns about IoT adoption?. Available: https://www.statista.com/statistics/690190/iot-adoption-hurdles-and-obstacles/

  50. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. Paper presented at the Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, (2005)

  51. Boualouache, A., Senouci, S.-M., Moussaoui, S.: Vlpz: The vehicular location privacy zone. Proc. Comput. Sci. 83, 369–376 (2016)

    Article  Google Scholar 

  52. Palanisamy, B., Liu, L.: Mobimix: protecting location privacy with mix-zones over road networks. In: Data Engineering (ICDE), 2011 IEEE 27th International Conference on 2011, pp. 494–505: IEEE (2011)

  53. Liu, X., Li, X.: Privacy preservation using multiple mix zones. In: Location Privacy Protection in Mobile Networks: Springer, pp. 5–30 (2013)

  54. Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., Fang, Y.: Traffic-aware multiple mix zone placement for protecting location privacy. In: 2012 Proceedings IEEE INFOCOM, pp. 972–980: IEEE (2012)

  55. Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)

    Article  Google Scholar 

  56. Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5: IEEE (2011)

  57. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569 (2007)

    Article  Google Scholar 

  58. Gerlach, M., Guttler, F.: Privacy in VANETs using changing pseudonyms-ideal and real. In: Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th, pp. 2521–2525: IEEE (2007)

  59. Pan, Y., Li, J.: Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 36(6), 1599–1609 (2013)

    Article  MathSciNet  Google Scholar 

  60. Pan, Y., Shi, Y., Li, J.: A novel and practical pseudonym change scheme in VANETs. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 413–422: Springer (2017)

  61. Rifa-Pous, H., Herrera-Joancomartí, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31–48 (2011)

    Article  Google Scholar 

  62. Brown, M., Hankerson, D., López, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. In: Cryptographers’ Track at the RSA Conference, pp. 250–265: Springer (2001)

  63. Eckhoff, D., German, R., Sommer, C., Dressler, F., Gansen, T.: Slotswap: strong and affordable location privacy in intelligent transportation systems. IEEE Commun. Mag. 49(11), 126–133 (2011)

    Article  Google Scholar 

  64. Pan, Y., Li, J., Feng, L., Xu, B.: An analytical model for random changing pseudonyms scheme in VANETs. In: Network Computing and Information Security (NCIS), 2011 International Conference on, 2011, vol. 2, pp. 141–145: IEEE (2011)

  65. Pan, Y., Li, J., Feng, L., Xu, B.: An analytical model for random pseudonym change scheme in VANETs. Clust. Comput. 17(2), 413–421 (2014)

    Article  Google Scholar 

  66. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 1, 46–55 (2003)

    Article  Google Scholar 

  67. Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: 2004. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127–131: IEEE. (2004)

  68. Tomandl, A., Scheuer, F., Federrath, H.: Simulation-based evaluation of techniques for privacy protection in VANETs. In: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 165–172: IEEE (2012)

  69. Leaf, W.A., Preusser, D.F.: Literature review on vehicle travel speeds and pedestrian injuries. US Department of Transportation, National Highway Traffic Safety Administration, (1999)

  70. Emara, K., Woerndl, W., Schlichter, J.: Beacon-based vehicle tracking in vehicular ad-hoc networks, (2013)

  71. Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 13(5), 36 (2006)

    Article  Google Scholar 

  72. Guo, L., et al.: A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J. 4(2), 601–610 (2017)

    Article  MathSciNet  Google Scholar 

  73. Committee, I.: IEEE standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Veh. Technol. Soc. vol. 1609, (2013)

  74. Fischer, L., Aijaz, A., Eckert, C., Vogt, D.: Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In: 4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany, 2006: Citeseer

  75. Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for conditional pseudonymity in VANETs. In: Wireless communications and networking conference (WCNC), 2010 IEEE, 2010, pp. 1–6: IEEE

  76. Bißmeyer, N., Petit, J., Bayarou, K.M.: CoPRA: conditional pseudonym resolution algorithm in VANETs. In: 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS), 2013, pp. 9–16: IEEE

  77. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  78. Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: A survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015)

    Article  Google Scholar 

  79. Kalman, R.E.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82(1), 35–45 (1960)

    Article  MathSciNet  Google Scholar 

  80. Fitzgerald, R.J.: Development of practical PDA logic for multitarget tracking by microprocessor. In: 1986 American Control Conference, 1986, pp. 889–898: IEEE

  81. Lochert, C., Hartenstein, H., Tian, J., Fussler,H., Hermann, D., Mauve, M.: A routing strategy for vehicular ad hoc networks in city environments. In: IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No. 03TH8683), pp. 156–161: IEEE (2003)

  82. Sommer, C., German, R., Dressler, F.: Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 10(1), 3–15 (2011)

    Article  Google Scholar 

  83. Lopez, P.A., et al.: Microscopic traffic simulation using SUMO. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pp. 2575–2582: IEEE (2018)

  84. Emara, K.: PREXT: Privacy Extension for Veins VANET Simulator. Paper presented at the in Vehicular Networking Conference (VNC), (2016)

  85. Haklay, M., Weber, P.: Openstreetmap: user-generated street maps. IEEE Pervas. Comput. 7(4), 12–18 (2008)

    Article  Google Scholar 

  86. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: Wireless Communications and Networking Conference, IEEE, 2005, vol. 2, pp. 1187–1192: IEEE (2005)

  87. Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 129–141: Springer (2007)

  88. Emara, K., Woerndl, W., Schlichter, J.: On evaluation of location privacy preserving schemes for VANET safety applications. Comput. Commun. 63, 11–23 (2015)

    Article  Google Scholar 

  89. Stojmenovic, I.: Position-based routing in ad hoc networks. IEEE Commun. Mag. 40(7), 128–134 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruqayah Al-ani.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-ani, R., Baker, T., Zhou, B. et al. Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int. J. Inf. Secur. 22, 763–783 (2023). https://doi.org/10.1007/s10207-023-00662-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00662-6

Keywords

Navigation