Skip to main content
Log in

A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the same pseudonym is constantly used for a vehicle, the adversary can easily track it. To improve location privacy, a lot of pseudonym change schemes have been proposed. However, the tracker can match vehicles by the beacon message when it has found that the pseudonym is changed. Besides, every vehicle must hold lots of pseudonyms to change in these schemes. In this paper, we propose a trigger-based pseudonym exchange scheme, which aims to thwart to track vehicle from the sending beacons and reduce the storage consumption. We propose two trigger-based algorithms to decide when and how a vehicle exchange pseudonym with others. To evaluate the performance of our scheme, we conduct the probability of exchanging pseudonym in a road segment and a traffic intersection, and measure the tracking percent by an empirical tracker. The simulation results show that our scheme is resilient to confuse the tracker efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37(1):380–392

    Article  Google Scholar 

  2. Carianha AM, Barreto LP, Lima G (2011) Improving location privacy in mix-zones for VANETs. In: PERFORMANCE computing and communications conference, pp 1–6

  3. Doumiati S, Al Choikani T, Artail H (2015) LPS for LBS: Location-privacy scheme for location-based services. In: IEEE/ACS International conference on computer systems and applications, pp 449–456

  4. Eckhoff D, Sommer C, Gansen T, German R (2010) Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In: IEEE vehicular NETWORKING conference, Vvnc 2010. Jersey City, pp 174–181

  5. Emara K, Woerndl W, Schlichter J (2015) On evaluation of location privacy preserving schemes for VANET safety applications. Comput Commun 63(C):11–23

    Article  Google Scholar 

  6. Farooq MU, Pasha M, Khan KUR, Atif MUH (2011) An advanced security and data integrity protocol for vehicular ad-hoc networks. Adv Mater Res 403-408:994–1001

    Article  Google Scholar 

  7. Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux JP (2007) Mix-zones for location privacy in vehicular networks. In: WiN-ITS, p 07

  8. Huang D, Misra S, Verma M, Xue G (2011) PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans Intell Transp Syst 12(3):736–746

    Article  Google Scholar 

  9. Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans Intell Transp Syst 17(8):2193–2204

    Article  Google Scholar 

  10. Li M, Sampigethaya K, Huang L, Poovendran R (2006) Swing & Swap: User-centric approaches towards maximizing location privacy. In: Proceedings of Acm Wpes’, pp 19–28

  11. Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in VANETs. In: The International symposium on pervasive systems, algorithms, and networks, Ispan 2009. Kaohsiung, pp 648–652

  12. Liu Y, Wang L, Chen H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710

    Article  Google Scholar 

  13. Lu R, Lin X, Luan TH, Liang X (2012) Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans Veh Technol 61(1):86–96

    Article  Google Scholar 

  14. Mathews MS, Bevish Jinila Y (2014) An effective strategy for pseudonym generation & changing scheme with privacy preservation for VENET. In: International conference on electronics and communication systems, pp 1–6

  15. Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36(6):1599–1609

    Article  MathSciNet  Google Scholar 

  16. Pan Y, Li J, Feng L, Xu B (2014) An analytical model for random pseudonym change scheme in VANETs. Clust Comput 17(2): 413–421

    Article  Google Scholar 

  17. Petit J, Schaub F, Feiri M, Kargl F (2015) Pseudonym schemes in vehicular networks: A survey. IEEE Commun Surv Tutor 17(1):228–255

    Article  Google Scholar 

  18. Qu F, Wu Z, Wang FY, Cho W (2015) A security and privacy review of VANETs. IEEE Trans Intell Transp Syst 16(6):1–12

    Article  Google Scholar 

  19. Sampigethaya K, Huangy L, Li M, Poovendran R, Matsuuray K, Sezakiy K (2005) CARAVAN: Providing location privacy for VANET. In: Embedded security in cars (ESCAR)

  20. Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: Robust location privacy scheme for VANET. IEEE J Select Areas Commun 25(8):1569–1589

    Article  Google Scholar 

  21. Sun Y, Zhang B, Zhao B (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Network Appl 8(6):1108–1121

    Article  Google Scholar 

  22. Thenmozhi T, Somasundaram RM (2015) Pseudonyms based blind signature approach for an improved secured communication at social spots in vanets. Wirel Pers Commun 82(1):643–658

    Article  Google Scholar 

  23. Wang J, Yue W, Geng J, Jian Y, Feng Z (2012) Secure and privacy-preserving scheme based on pseudonyms exchanges for VANET. J Tsinghua Univ

  24. Wiedersheim B, Ma Z, Kargl F, Papadimitratos P (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: International conference on wireless on-demand network systems & services, pp 176–183

  25. Wolf M, Gendrullis T (2011) Design, implementation, and evaluation of a vehicular hardware security module. Springer, Berlin Heidelberg

    Google Scholar 

  26. Zhang C, Lu R, Lin X, Ho PH (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: INFOCOM 2008. the Conference on computer communications. IEEE, pp 246–250

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nianmin Yao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, S., Yao, N., Gong, N. et al. A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Netw. Appl. 11, 548–560 (2018). https://doi.org/10.1007/s12083-017-0557-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0557-5

Keywords

Navigation