Skip to main content
Log in

SafeAnon: a safe location privacy scheme for vehicular networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In most safety applications within vehicle ad-hoc networks (VANETs), vehicles need to periodically broadcast messages with information of their precise positions to others. These broadcast messages, however, make it easy to track vehicles and will likely lead to violations of personal privacy. Unfortunately, most of the current location privacy enhancement methodologies in VANETs suffer some shortcomings and do not take driving safety into consideration. In this paper, we propose a safe distance based location privacy scheme called SafeAnon, which can significantly enhance location privacy as well as traffic safety. By simulating vehicular mobility in a cropped Manhattan map, we evaluate the performance of the proposed scheme under various conditions. The mean entropy, warning broadcast ratio, and mean silent period of SafeAnon scheme are increasing 58%, 281%, and 50% respectively than the random silent period (RSP) scheme. The total broadcast ratio is also 33% less than that in the RSP scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. The CAMP Vehicle Safety Communications Consortium (2005). Vehicle safety communications project task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc. National HighwayTraffic Safety Administration.

  2. Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.

    Google Scholar 

  3. Lu, R., Lin, X., Zhu, H., Ho, P., & Shen, X. (2008). Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008, The 27th conference on computer communications (pp. 1229–1237). New York: IEEE Press.

    Chapter  Google Scholar 

  4. Edwards, J. Location privacy protection act of 2001.

  5. Frelinghuysen, R. Wireless privacy protection act of 2003.

  6. Dötzer, F. (2006). Privacy issues in vehicular ad hoc networks. In Privacy enhancing technologies (pp. 197–209).

  7. Gerlach, M., & Guttler, F. (2007). Privacy in VANETs using changing pseudonyms-ideal and real. In IEEE 65th vehicular technology conference, VTC2007-Spring (pp. 2521–2525).

    Chapter  Google Scholar 

  8. Calandriello, G., Hubaux, J., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in VANET. In Proceedings of the fourth ACM international workshop on vehicular ad hoc networks (pp. 19–28).

    Chapter  Google Scholar 

  9. Huang, L., Matsuura, K., Yamane, H., & Sezaki, K. (2005). Towards modeling wireless location privacy. In Workshop on privacy enhancing technologies (PET).

    Google Scholar 

  10. Sampigethaya, K., Li, M. Y., Huang, L. P., & Poovendran, R. (2007). Amoeba: robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications, 25(8), 1569–1589.

    Article  Google Scholar 

  11. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services (pp. 31–42).

    Google Scholar 

  12. Shin, H., Atluri, V., & Vaidya, J. (2008). A profile anonymization model for privacy in a personalized location based service environment. In 9th international conference on mobile data management, 2008, MDM’08 (pp. 73–80).

    Chapter  Google Scholar 

  13. Gedik, B., & Liu, L. (2004). A customizable k-anonymity model for protecting location privacy. Georgia Institute of Technology.

  14. Hoh, B., Gruteser, M., Xiong, H., & Alrabady, A. (2007). Preserving privacy in gps traces via uncertainty-aware path cloaking. In Proceedings of the 14th ACM conference on computer and communications security (pp. 161–171).

    Chapter  Google Scholar 

  15. Meyerowitz, J. T., & Choudhury, R. R. (2009). Realtime location privacy via mobility prediction: creating confusion at crossroads. In Proceedings of the 10th workshop on mobile computing systems and applications, Santa Cruz, California.

    Google Scholar 

  16. Beresford, A., & Stajano, F. (2004). Mix zones: user privacy in location-aware services. In Proceedings of first IEEE international workshop on pervasive computing and communication security (PerSec).

    Google Scholar 

  17. Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., & Hubaux, J. P. (2007). Mix-zones for location privacy in vehicular networks. In Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS), Vancouver, Canada, 2007/08.

    Google Scholar 

  18. Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6 Part 1), 3442–3456.

    Article  Google Scholar 

  19. Armknecht, F., Festag, A., Westhoff, D., & Zeng, K. (2007). Cross-layer privacy enhancement and non-repudiation in vehicular communication. In 4th workshop on mobile ad-hoc networks (WMAN), March.

    Google Scholar 

  20. Chow, C., Mokbel, M., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems (pp. 171–178).

    Google Scholar 

  21. Maxim, R., & Jean-Pierre, H. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, Alexandria, VA, USA.

    Google Scholar 

  22. Tang, L., Hong, X., & Bradford, P. G. (2008). Privacy-preserving secure relative localization in vehicular networks. Security and Communication Networks, 1(3), 195–204.

    Article  Google Scholar 

  23. Laurendeau, C., & Barbeau, M. (2009). Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks. EURASIP Journal on Wireless Communications and Networking.

  24. Li, M., Sampigethaya, K., Huang, L., & Poovendran, R. (2006). Swing & swap: User-centric approaches towards maximizing location privacy. In Proceedings of the 5th ACM workshop on privacy in electronic society (pp. 19–28).

    Chapter  Google Scholar 

  25. Tonguz, O., Wisitpongphan, N., Bai, F., Mudalige, P., & Sadekar, V. (2007). Broadcasting in VANET. In 2007 mobile networking for vehicular environments (pp. 7–12).

    Chapter  Google Scholar 

  26. Tonguz, O. K., Wisitpongphan, N., Parikh, J. S., Fan, B., Mudalige, P., & Sadekar, V. K. (2006). On the broadcast storm problem in ad hoc wireless networks. In 3rd international conference on broadband communications, networks and systems, 2006. BROADNETS 2006 (pp. 1–11).

    Chapter  Google Scholar 

  27. Wei, Y.-C., Chen, Y.-M., & Shan, H.-L. (2010). Rssi-based user centric anonymization for location privacy in vehicular networks. In Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 42, pp. 39–51).

    Google Scholar 

  28. Hubaux, J. P., Capkun, S., & Jun, L. (2004). The security and privacy of smart vehicles. Security & Privacy, IEEE, 2(3), 49–55.

    Article  Google Scholar 

  29. Yan, G., Olariu, S., & Weigle, M. C. (2008). Providing VANET security through active position detection. Computer Communications, 31, 2883–2897.

    Article  Google Scholar 

  30. Bouassida, M., Guette, G., Shawky, M., & Ducourthial, B. (2009). Sybil nodes detection based on received signal strength variations within VANET. International Journal of Network Security, 9(1), 22-23.

    Google Scholar 

  31. Bin, X., Bo, Y., & Chuanshan, G. (2006). Detection and localization of Sybil nodes in VANETs. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, Los Angeles, CA, USA.

    Google Scholar 

  32. Demirbas, M., & Song, Y. (2006). An rssi-based scheme for Sybil attack detection in wireless sensor networks. In WOW MOM (pp. 564–570). Washington: IEEE Computer Society.

    Google Scholar 

  33. 2008 traffic safety facts annual fars/ges report (early edition) (2008). In NHTSA (Ed.): U.S. Department of Transportation.

  34. Brunson, S., Kyle, E., Phamdo, N., & Preziotti, G. (2002). Alert algorithm development program: Nhtsa rear-end collision alert algorithm, final report. Report DOT HS, pp. 526, 809.

  35. Ararat, O., Kural, E., & Guvenc, B. (2006). Development of a collision warning system for adaptive cruise control vehicles using a comparison analysis of recent algorithms. In IEEE intelligent vehicles symposium (pp. 194–199).

    Chapter  Google Scholar 

  36. Yizhen, Z., Antonsson, E. K., & Grote, K. (2006). A new threat assessment measure for collision avoidance systems. In Intelligent transportation systems conference, 2006. ITSC’06 (pp. 968–975). New York: IEEE Press.

    Chapter  Google Scholar 

  37. Doi, A., Butsuen, T., Niibe, T., Yakagi, T., Yamamoto, Y., & Seni, H. (1994). Development of a rear-end collision avoidance system with automotive braking control. JASE Review, 15, 335–340.

    Article  Google Scholar 

  38. Fujita, Y., Akuzawa, K., & Sato, M. (1995). Radar brake system. JSAE Review, 16(2), 219–219.

    Google Scholar 

  39. Lee, K., & Peng, H. (2005). Evaluation of automotive forward collision warning and collision avoidance algorithms. Vehicle System Dynamics, 43(10), 735–751.

    Article  Google Scholar 

  40. Zheng, P., & McDonald, M. (2003). The effect of sensor errors on the performance of collision warning systems. In Proceedings of IEEE intelligent transportation systems, 2003. 1.

    Google Scholar 

  41. Wei, Y.-C., & Chen, Y.-M. (2010). Safe distance based location privacy in vehicular networks. In IEEE 71th vehicular technology conference, VTC 2010-Spring, 16–19 May 2010 (pp. 1–5).

    Google Scholar 

  42. Jain, A., Nandakumar, K., & Ross, A. (2005). Score normalization in multimodal biometric systems. Pattern recognition, 38(12), 2270–2285.

    Article  Google Scholar 

  43. Boukerche, A., Oliveira, H., Nakamura, E. F., & Loureiro, A. A. F. (2008). Vehicular ad hoc networks: a new challenge for localization-based systems. Computer Communications, 31(12), 2838–2849.

    Article  Google Scholar 

  44. Jagadeesh, G. R., Srikanthan, T., & Zhang, X. D. (2004). A map matching method for gps based real-time vehicle location. Journal of Navigation, 57(03), 429–440.

    Article  Google Scholar 

  45. Serjantov, A., & Danezis, G. (2003). Towards an information theoretic metric for anonymity. Lecture Notes in Computer Science, 2482, 41–53.

    Article  Google Scholar 

  46. Hayward, J. C. (1972). Near miss determination through use of a scale of danger. Highway Research Record, 384, 24–34.

    Google Scholar 

  47. Sumo-simulation of urban mobility. http://sumo.sourceforge.net.

  48. Trans-traffic and network simulation environment. http://trans.epfl.ch.

  49. U.S. Census bureau—topologically integrated geographic encoding and referencing (tiger) system. http://www.census.gov/geo/www/tiger.

  50. Ns-2-network simulator. http://nsnam.isi.edu/nsnam.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chih Wei.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, YM., Wei, YC. SafeAnon: a safe location privacy scheme for vehicular networks. Telecommun Syst 50, 339–354 (2012). https://doi.org/10.1007/s11235-010-9408-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9408-x

Keywords

Navigation