Abstract
Location privacy is one of the main challenges in Vehicular Ad-hoc Networks (VANETs), since weak protection may hinder the public acceptance of this technology. Frequently changing pseudonyms are commonly accepted as a solution to protect the location privacy in VANETs. However, a simple pseudonym change is not enough to provide the required protection. Although many pseudonym changing strategies have been proposed to enhance the location privacy protection provided by this approach, the development of an effective strategy is not yet achieved. In this paper, we propose a new pseudonym changing strategy called Traffic-Aware Pseudonym Changing Strategy (TAPCS). The aim of this strategy is to provide an effective location privacy protection against the different types of pseudonyms linking attacks that can be performed by a strong passive adversary model. TAPCS is a distributed pseudonym changing strategy and is one of the strategies that use the radio silence technique. Unlike the existing distributed pseudonym changing strategies that use this technique, TAPCS aims to provide a high level of location privacy protection without impacting the safety in the VANETs. The analytical evaluation and simulation results demonstrate the effectiveness of the proposed strategy.
Similar content being viewed by others
Notes
References
Boualouache A, Moussaoui S (2014) S2si: A practical pseudonym changing strategy for location privacy in vanets. In: 2014 International conference on advanced networking distributed systems and applications (INDS). IEEE, pp 70–75
Boualouache A, Moussaoui S (2015) Urban pseudonym changing strategy for location privacy in vanets. Int J Ad Hoc Ubiquit Comput (in the press)
Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: Proceedings of the 4th European conference on security and privacy in ad-hoc and sensor networks, ESAS’07. Springer-Verlag, Berlin, Heidelberg, pp 129–141
Buttyan L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: Proceedings of the IEEE vehicular networking conference (VNC). Tokyo, Japan. IEEE, Los Alamitos
Collins K, Muntean G (2008) Route-based vehicular traffic management for wireless access in vehicular environments. In: Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, pp 1–5
Daz C (2005) Anonymity metrics revisited. In: Anonymous communication and its applications, 09.10. - 14.10.2005, Dagstuhl seminar proceedings, vol 05411
Eckhoff D, German R, Sommer C, Dressler F, Gansen T (2011) Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Commun Mag 49(11):126– 133
Eckhoff D, Sommer C, Gansen T, German R, Dressler F (2010) Strong and affordable location privacy in vanets: Identity diffusion using time-slots and swapping. In: Vehicular networking conference (VNC), 2010 IEEE, pp174–181
Emara K, Woerndl W, Schlichter JH (2013) Vehicle tracking using vehicular network beacons. In: IEEE 14th International symposium on a world of wireless, mobile and multimedia networks, WoWMoM 2013, Madrid, Spain, pp 1–6. IEEE
Freudiger J, Raya M, Felegyhazi M, Papadimitratos P, Hubaux J (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)
Gerlach M, Gttler F (2007) Privacy in vanets using changing pseudonyms - ideal and real. In: VTC Spring. IEEE, pp 2521–2525
Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: Wireless communications and networking conference, 2005 IEEE, vol 2, pp 1187–1192
IEEE (2013) Ieee standard for wireless access in vehicular environments security services for applications and management messages. IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006), pp 1–289
Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T (2011) Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. Commun Surveys Tutor IEEE 13(4):584–616
Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo simulation of urban mobility. Int J Adv Syst Measur 5(3):128–138
Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: Robust location privacy scheme for vanet. IEEE J Selected Areas Commun 1589
Lefevre S, Petit J, Bajcsy R, Laugier C, Kargl F (2013) Impact of v2x privacy strategies on intersection collision avoidance systems. In: Vehicular networking conference (VNC), 2013 IEEE, pp 71–78
Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in vanets. In: 2009 10th International symposium on pervasive systems, algorithms, and networks (ISPAN), pp 648–652. IEEE
Lu R, Lin X, Luan T, Liang X, Shen X (2012) Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE T Veh Technol 86–96
Marfia G, Roccetti M (2011) Vehicular congestion detection and short-term forecasting: A new model with results. IEEE Trans Veh Technol 60(7):2936–2948
Milojevic M, Rakocevic V (2014) Distributed road traffic congestion quantification using cooperative vanets. In: 2014 13th Annual mediterranean ad hoc networking workshop (MED-HOC-NET). IEEE, pp 203–210
NHTSTA Preliminary statement of policy concerning automated vehicles (2013). Technical report, the U.S National Highway Traffic Safety Administration (NHTSTA)
Petit J, Schaub F, Feiri M, Kargl F (2014) Pseudonym schemes in vehicular networks: A survey. Commun Surveys Tutor IEEE PP(99):1–32
Rybicki J, Scheuermann B, Kiess W, Lochert C, Fallahi P, Mauve M (2007) Challenge: Peers on wheels-a road to new traffic information systems. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pp 215–221. ACM
Sadiku MN, Musa S (2013) Performance analysis of computer networks. Springer
Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) Caravan: Providing location privacy for vanet. In: In embedded security in cars (ESCAR)
Sommer C, German R, Dressler F (2011) Bidirectionally coupled network and road traffic simulation for improved ivc analysis. IEEE Trans Mobile Comput 10(1):3–15
Sommer C, Schmidt A, Chen Y, German R, Koch W, Dressler F (2010) On the feasibility of umts-based traffic information systems. Ad Hoc Netw 8(5):506–517
Song JH, Wong V, Leung V (2009) Wireless location privacy protection in vehicular ad-hoc networks. In: IEEE International conference on communications, 2009. ICC ’09., pp 1–6
Song JH, Wong V, Leung V (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mobile Netw Appl 15(1):160–171
Wang C, Tsai HM (2013) Detecting urban traffic congestion with single vehicle. In: 2013 International conference on connected vehicles and expo (ICCVE). IEEE, pp 233–240
Wasef A, Shen X (2010) Rep: Location privacy for vanets using random encryption periods. Mobile Netw Appl 15(1):172– 185
Wiedersheim B, Ma Z, Kargl F, Papadimitratos P (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: Proceedings of the 7th international conference on Wireless on-demand network systems and services, WONS’10. IEEE Press, Piscataway, pp 176– 183
Wischoff L, Ebner A, Rohling H, Lott M, Halfmann R (2003) Sotis-a self-organizing traffic information system. In: Vehicular technology conference, 2003. VTC 2003-Spring. The 57th IEEE semiannual, vol 4. IEEE, pp 2442–2446
Ying B, Makrakis D, Mouftah H (2013) Dynamic mix-zone for location privacy in vehicular networks. Commun Lett IEEE 17(8):1524–1527
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Boualouache, A., Moussaoui, S. TAPCS: Traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw. Appl. 10, 1008–1020 (2017). https://doi.org/10.1007/s12083-016-0461-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-016-0461-4