Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks

Vehicular ad hoc networks (VANETs) are the preferable choice for Intelligent Transportation Systems (ITS) because of its prevailing significance in both safety and nonsafety applications. Information dissemination in a multihop fashion along with privacy preservation of source node is a serious but challenging issue. We have used the idea of the phantom node as the next forwarder for data dissemination. The phantom node (vehicle) hides the identity of actual source node thus preserving the location privacy. The selection of the phantom node among the set of alternatives’ candidate vehicles is considered as a multicriteria-based problem. The phantom node selection problem is solved by using an analytical network process (ANP) by considering different traffic scenarios. The selection is based on different parameters which are distance, speed, trust, acceleration, and direction. The best alternative (target phantom vehicle) is selected through an ANP where all the alternatives are ranked from best to worst. The vehicle having maximum weight is considered to be the best choice as a phantom node. In order to check the stability of the alternatives’ ranking, sensitivity analysis is performed by taking into account different traffic scenarios and interest level of candidate vehicles.

[1]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[2]  Vijay Laxmi,et al.  A sybil attack detection approach using neighboring vehicles in VANET , 2011, SIN '11.

[3]  Mina Rahbari,et al.  Efficient Detection of Sybil Attack Based on Cryptography in Vanet , 2011, ArXiv.

[4]  Vijay Varadharajan,et al.  TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks , 2007, 2007 15th IEEE International Conference on Networks.

[5]  Murad Khan,et al.  Multicriteria Based Next Forwarder Selection for Data Dissemination in Vehicular Ad Hoc Networks Using Analytical Network Process , 2017 .

[6]  Lian Zhao,et al.  Impact of Mobility on VANETs' Safety Applications , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Ali Movaghar,et al.  A novel approach for avoiding wormhole attacks in VANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[8]  Yue Cao,et al.  A comparative study of scenario-driven multi-hop broadcast protocols for VANETs , 2018, Veh. Commun..

[9]  Azim Eskandarian,et al.  Fast, robust message forwarding for inter-vehicle communication netw , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[10]  Thomas L. Saaty,et al.  Theory and Applications of the Analytic Network Process: Decision Making With Benefits, Opportunities, Costs, and Risks , 2005 .

[11]  Murad Khan,et al.  Analytical network process based optimum cluster head selection in wireless sensor network , 2017, PloS one.

[12]  Thomas L. Saaty,et al.  Decision making with dependence and feedback : the analytic network process : the organization and prioritization of complexity , 1996 .

[13]  Wann-Ming Wey,et al.  Using ANP priorities with goal programming in resource allocation in transportation , 2007, Math. Comput. Model..

[14]  Ivan Stojmenovic,et al.  Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.

[15]  T. Saaty Decision making — the Analytic Hierarchy and Network Processes (AHP/ANP) , 2004 .

[16]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[17]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[18]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[19]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[20]  Ahmad Al-Daraiseh,et al.  Toward Secure Vehicular Ad-hoc Networks: A Survey , 2012 .

[21]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[22]  Ali Mahani,et al.  Sybil attack Detection: Improving security of WSNs for smart power grid application , 2013, 2013 Smart Grid Conference (SGC).

[23]  Bhargav Bellur,et al.  Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[24]  Haleem Farman,et al.  Estimation of software features based birthmark , 2017, Cluster Computing.

[25]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[26]  Victor C. M. Leung,et al.  Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks , 2010, Mob. Networks Appl..

[27]  Syed Hassan Ahmed,et al.  Hybrid Adaptive Beaconing in Vehicular Ad Hoc Networks: A Survey , 2015, Int. J. Distributed Sens. Networks.

[28]  Adrian Perrig,et al.  Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.

[29]  Shengli Xie,et al.  MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.

[30]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[31]  A. Festag,et al.  A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .

[32]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[33]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .