Skip to main content

Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks

  • Chapter
Book cover Transactions on Computational Science IV

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 5430))

Abstract

A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location through the communication broadcast is a threat to privacy. A vehicle can preserve its anonymity by being indistinguishable in the neighborhood crowd through continual change of identity and by hiding among its neighbors. This paper addresses the challenges in providing anonymity to a moving vehicle that uses a temporary identity for transmission and continually changes this pseudonym. As a vehicle moves on a road, its neighbors change in accordance to its relative speed with neighboring vehicles. The nature and size of the neighborhood changes the effective crowd provided by the vehicles constituting this neighborhood. Since, all neighboring vehicles do not contribute to the anonymity; the degree of anonymity is reduced. The work focuses on updation of pseudonym by a vehicle in order to sustain or enhance its anonymity by decorrelating the relation between its physical location and identity. A heuristic that allows a vehicle to switch its pseudonym at a time and place where the anonymity can be enhanced is proposed. Results indicate that updating pseudonyms in accordance to the heuristic enhances the anonymity of a vehicle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of SASN 2005, pp. 11–21 (2005)

    Google Scholar 

  2. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39–68 (2007)

    Google Scholar 

  3. Dotzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for Secure and Private Vehicular Communications. In: International Conference on ITS Telecommunications (ITST 2007), Sophia Antipolis, France (2007)

    Google Scholar 

  5. Andreas, P., Marit, H.: Anonymity, unobservability, and pseudonymity: A proposal for terminology, Draft, v0.21, HBCC 2004 (2004)

    Google Scholar 

  6. Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In: Proceedings of 65th Vehicular Technology Conference VTC 2007-Spring, pp. 2521–2525 (2007)

    Google Scholar 

  7. Kewei, S., Yong, X., Weisong, S., Loren, S., Tao, Z.: Adaptive Privacy-Preserving Authentication in Vehicular Networks. In: Proceedings of IEEE International Workshop on Vehicle Communication and Applications (2006)

    Google Scholar 

  8. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)

    Google Scholar 

  9. Jinyuan, S., Chi, Z., Yuguang, F.: An id-based framework achieving privacy and non-repudiation in Vehicular ad hoc networks. In: Military Communications Conference, MILCOM 2007. IEEE, Los Alamitos (2007)

    Google Scholar 

  10. Emanuel, F., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (WCNC) (2007)

    Google Scholar 

  11. Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES 2006, Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 19–27 (2006)

    Google Scholar 

  12. Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-Zones for Location Privacy in Vehicular Networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007), Vancouver (2007)

    Google Scholar 

  13. Bettstetter, C., Resta, G., Santi, P.: The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. on Mobile Computing 2(3), 257–269 (2003)

    Article  Google Scholar 

  14. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Silent cascade: Enhancing location privacy without communication qoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 165–180. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Berthold, O., Federrath, H., Köpsell, S.: Web mIXes: A system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Sezaki, K.: CARAVAN: Providing location privacy for VANET. WPES 2006. In: Proc. of Embedded Security in Cars (ESCAR) (2005)

    Google Scholar 

  17. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys., pp. 31–42 (2003)

    Google Scholar 

  18. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech. Report SRI-CSL-98-04, CS Lab, SRI International (1998)

    Google Scholar 

  19. Wu, X., Elisa, B.: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. On Dependable and Secure Computing 4(4), 252–264 (2007)

    Article  Google Scholar 

  20. Khabazian, M., Ali, M.K.: Generalized Performance Modeling of Vehicular Ad Hoc Networks (VANETs). In: ISCC 2007, pp. 51–56 (2007)

    Google Scholar 

  21. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons, Chichester (2002)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chaurasia, B.K., Verma, S., Tomar, G.S., Abraham, A. (2009). Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science IV. Lecture Notes in Computer Science, vol 5430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01004-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01004-0_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01003-3

  • Online ISBN: 978-3-642-01004-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics