Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks

Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability of such information must be weighted against the potential for abuse. In this paper, we investigate the problem of alleviating unauthorized tracking of target vehicles by adversaries in VANETs.We propose a vehicle density-based location privacy (DLP) scheme which can provide location privacy by utilizing the neighboring vehicle density as a threshold to change the pseudonyms. We derive the delay distribution and the average total delay of a vehicle within a density zone. Given the delay information, an adversary may still be available to track the target vehicle by a selection rule. We investigate the effectiveness of DLP based on extensive simulation study. Simulation results show that the probability of successful location tracking of a target vehicle by an adversary is inversely proportional to both the traffic arrival rate and the variance of vehicles' speed. Our proposed DLP scheme also has a better performance than both Mix-Zone scheme and AMOEBA with random silent period.

[1]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[2]  Matthias Gerlach,et al.  Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[3]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[4]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[5]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[6]  Itamar Elhanany,et al.  A Novel Signal-Scheduling Algorithm With Quality-of-Service Provisioning for an Isolated Intersection , 2008, IEEE Transactions on Intelligent Transportation Systems.

[7]  Marco Gruteser,et al.  USENIX Association , 1992 .

[8]  Kaoru Sezaki,et al.  Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[9]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[10]  Brian Wolshon,et al.  Analysis of intersection delay under real-time adaptive signal control , 1999 .

[11]  Ozan K. Tonguz,et al.  Routing in Sparse Vehicular Ad Hoc Wireless Networks , 2007, IEEE Journal on Selected Areas in Communications.

[12]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[13]  Xiaoyan Hong,et al.  Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks , 2007, 2007 IEEE Intelligence and Security Informatics.

[14]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[15]  Ehssan Sakhaee,et al.  A Stable Routing Protocol to Support ITS Services in VANET Networks , 2007, IEEE Transactions on Vehicular Technology.

[16]  Rui L. Aguiar,et al.  Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[17]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[18]  Mustafa K. Mehmet Ali,et al.  A Performance Modeling of Vehicular Ad Hoc Networks (VANETs) , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[19]  Stephen E. Deering,et al.  ICMP Router Discovery Messages , 1991, RFC.

[20]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[21]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[22]  Hong K. Lo,et al.  A reliability framework for traffic signal control , 2006, IEEE Transactions on Intelligent Transportation Systems.

[23]  黒田 孝次,et al.  Highway Capacity Manual改訂の動向--テイラ-教授の講演より , 1984 .

[24]  Ran Canetti,et al.  Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.

[25]  Sheldon M. Ross,et al.  Introduction to Probability Models (4th ed.). , 1990 .

[26]  Tim Leinmüller,et al.  Impact of Pseudonym Changes on Geographic Routing in VANETs , 2006, ESAS.