Abstract
In this paper, we propose an efficient dynamic pseudonymous based multiple mix-zones authentication protocol for privacy preservation to enhance security over road networks. Most of the existing protocols either utilize pseudonym based approaches with certificate revocation list that cause significant communicational and storage overhead or they use group signature based approaches, which are computationally expensive. In this paper, we present a dynamic pseudonymous based multiple mix-zones authentication protocol that only requires mobile vehicles to communicate with reported server for registration and dynamic pseudonym change. Furthermore, we formulate a mechanism to provide users with dynamic pseudonyms named as; base pseudonyms and short time pseudonyms, to achieve users’ privacy. Finally, we analyze our protocol by determining the communication cost as well as various attack scenarios to prove that our approach is most efficient and robust as compared to existing techniques.
Similar content being viewed by others
References
Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.
Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860.
Kumaresan, G., Kumaresan, G., Adiline, T. MacrigaGroup key authentication scheme for Vanet INtrusion detection (GKAVIN). Wireless Networks. doi:10.1007/s11276-016-1197-z.
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, IEEE Standard 1609.2 (2006).
Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013). Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528).
Liu, Y., Wang, L., & Chen, H.-H. (2015). Message authentication using proxy vehicles in vehicular ad Hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710.
Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web. doi:10.1007/s11280-016-0403-3.
Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications. doi:10.1007/s11042-016-3834-z.
Chim, T. W., Yiu, S. M., Hui, C. K., & Li, O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524.
Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362.
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., & Hammad, M. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications: An International Journal, 79(1), 661–686.
Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications: An International Journal, 80(1), 85–96.
Kamenyi, D. M., Wang, Y., Fengli, Z., Imran, M., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
Memon, I., Jamro, D. L., Mangi, F. A., Basit, M. A., Memon, M. H. (2013). Source localization wireless sensor network using time difference of arrivals (TDOA). International Journal of Scientific and Engineering Research, 4(7), 1046–1054.
Domenic, K.,Wang, Y., Zhang, F., Memon, I., Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII2013) (pp. 352–355). Xi’an.
Gustav, Y., Wang, Y., Zhang, F., Domenic, K. M., Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th International Conference on Computational Problem-Solving (ICCP 2013), Jiuzhai.
Dai, W. Crypto++ 5.6. 0 benchmarks. http://www.cryptopp.com/benchmarks.html.
Miracl benchmarks. www.shamus.ie/index.php.
Cygwin: Linux Environment Emulator for Windows. http://www.cygwin.com/.
Simulation of urban mobility (SUMO). http://sumo.sourceforge.net.
Acknowledgements
This research has been funded by The National High Technology Research and Development Program of China (Nos. 2014AA123103, 2015AA124103) and National Natural Science Foundation of China (Nos. 61401040, 61372110).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arain, Q., Zhongliang, D., Memon, I. et al. Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks. Wireless Pers Commun 95, 505–521 (2017). https://doi.org/10.1007/s11277-016-3906-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3906-4