Identity privacy-based reliable routing method in VANETs

In vehicular ad hoc networks (VANETs), reliable transmission and privacy of vehicles are two important issues. When vehicles are in the fast-moving environment, this paper proposes a Dynamic ID scheme which can protect the privacy of vehicles’ identity. In this paper, we divide the message transferring model into the uploading process and the downloading process. The uploading process has four stages, including the Connection establishment, the game, the detecting process and the messages sending process. In the four stages, this paper uses the Dynamic ID scheme, realizing the identity privacy. In the communication of ensuring the privacy, this paper builds a game model which is based on the reliability and the frequency of contacts, accomplishing the reliable transmission. Finally, the results of the simulation demonstrate that the presented method, the Identity Privacy-based Reliable Routing method (IPRR), cannot only increase the delivery ratio, but also reduce the end to end delay and the overhead ratio of the Network.

[1]  Mehdi Bennis,et al.  Non-cooperative operators in a game-theoretic framework , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[2]  Fotini-Niovi Pavlidou,et al.  Game theory for routing modeling in communication networks — A survey , 2008, Journal of Communications and Networks.

[3]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Gongjun Yan,et al.  An efficient geographic location-based security mechanism for vehicular adhoc networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[5]  Eitan Altman,et al.  Non-cooperative routing in loss networks , 2002, Perform. Evaluation.

[6]  Pin-Han Ho,et al.  Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.

[7]  K. Jayarajan,et al.  A noncooperative game approach for intrusion detection in Mobile Adhoc networks , 2008, 2008 International Conference on Computing, Communication and Networking.

[8]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[9]  Yi-Bing Lin,et al.  An efficient identity-based cryptosystem for end-to-end mobile security , 2006, IEEE Transactions on Wireless Communications.

[10]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[11]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.

[12]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[13]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[15]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[16]  Sagar Naik,et al.  Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks , 2011, 2011 Proceedings IEEE INFOCOM.

[17]  Songwu Lu,et al.  Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..

[18]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[19]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[20]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[21]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[22]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[23]  Songwu Lu,et al.  Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2007, IEEE Transactions on Vehicular Technology.

[24]  Kyung-Joon Park,et al.  Noncooperative carrier sense game in wireless networks , 2009, IEEE Transactions on Wireless Communications.

[25]  Elmar Schoch,et al.  Communication patterns in VANETs , 2008, IEEE Communications Magazine.