Maximising anonymity of a vehicle

A vehicle can be tracked through its transmission. The broadcast by a source contains its current identity and also allows estimation of its location by receivers of this transmission. This mapping between the physical entity and the location estimated from the communication broadcast is a threat to privacy. This article addresses the challenges in providing anonymity to a moving vehicle that continually switches identifiers. As a vehicle moves on a road, its neighbours change in accordance to its relative speed with neighbouring vehicles. This change in the nature and size of the neighbourhood, i.e. the anonymity set, reduces the anonymity of a vehicle. The work studies the possibility that a node may sustain or enhance its anonymity by changing its pseudonym in the vicinity of other vehicles to decorrelate the relation between its location and identity. A heuristic that allows a vehicle to switch its identity at a time and place where the potential of anonymity preservation can be maximised by increasin...

[1]  Mustafa K. Mehmet Ali,et al.  Generalized Performance Modeling of Vehicular Ad Hoc Networks (VANETs) , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[2]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[3]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[4]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[5]  Brijesh Kumar Chaurasia,et al.  Maximizing anonymity of a vehicle through pseudonym updation , 2008, WICON.

[6]  Kaoru Sezaki,et al.  Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation , 2006, SPC.

[7]  Brijesh Kumar Chaurasia,et al.  Optimizing Pseudonym Updation for Anonymity in VANETS , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[8]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2005, Mob. Networks Appl..

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[11]  Marco Gruteser,et al.  USENIX Association , 1992 .

[12]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[13]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  Radha Poovendran,et al.  Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.

[15]  Elisa Bertino,et al.  An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[16]  Kaoru Sezaki,et al.  Towards Modeling Wireless Location Privacy , 2005, Privacy Enhancing Technologies.

[17]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .