PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks

Abstract With the rapid progress of wireless communication and big data, the traditional Vehicular Ad-hoc Networks (VANETs) gradually evolve into the new Heterogeneous Vehicular Networks (HetVNets). Meanwhile, with the combination of multiple forms of communication modes, it initiates the Vehicle to Everything(V2X) communication model providing more efficient services. V2X communication generates much more private data than traditional VANETs, but the concerns over privacy breaches are increasing. these big data burdens the concerns about. To protect the privacy in these cloud-based vehicular networks is remained unsolved. In this paper, we propose Privacy Assessment method with Uncertainty consideration (PAU) to estimate the nodes’ capability in protecting privacy, and then choose the vehicular nodes with high priority calculated by PAU to improve the whole network’s privacy protection level. PAU expands subjective logic based on two-tuple to triad and keeps uncertainty as a constituent element. It evaluates the nodes by using the historical data from the vehicular cloud and the real-time data from V2V communications. The experiments and analysis show that the improvement of privacy-preserving capability achieved when applied PAU in Mix-zone scenarios.

[1]  Dogan Kesdogan,et al.  Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.

[2]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[3]  Bart Preneel,et al.  ARM: anonymous routing protocol for mobile ad hoc networks , 2009, Int. J. Wirel. Mob. Comput..

[4]  Vijay Varadharajan,et al.  Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.

[5]  Yuanfang Chen,et al.  Efficient Spatial Keyword Query Processing in the Internet of Industrial Vehicles , 2018, Mob. Networks Appl..

[6]  Victor C. M. Leung,et al.  Delay-Optimal Virtualized Radio Resource Scheduling in Software-Defined Vehicular Networks via Stochastic Learning , 2016, IEEE Transactions on Vehicular Technology.

[7]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[8]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[9]  Vladimir M. Vishnevsky,et al.  Applying graph-theoretic approach for time-frequency resource allocation in 5G MmWave backhaul network , 2016, 2016 Advances in Wireless and Optical Communications (RTUWO).

[10]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[11]  Karim Emara,et al.  Safety-Aware Location Privacy in VANET: Evaluation and Comparison , 2017, IEEE Transactions on Vehicular Technology.

[12]  Sebastian Clauß,et al.  Structuring anonymity metrics , 2006, DIM '06.

[13]  David Eckhoff,et al.  Privacy assessment in vehicular networks using simulation , 2014, Proceedings of the Winter Simulation Conference 2014.

[14]  Frank Kargl,et al.  Context-adaptive detection of insider attacks in VANET information dissemination schemes , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[15]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[16]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[17]  Xia Feng,et al.  S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks , 2018, IEEE Access.

[18]  Yixiong Feng,et al.  Design of Distributed Cyber–Physical Systems for Connected and Automated Vehicles With Implementing Methodologies , 2018, IEEE Transactions on Industrial Informatics.

[19]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[20]  Dennis T. Lowry,et al.  Soap Opera Portrayals of Sex, Contraception, and Sexually Transmitted Diseases. , 1989 .

[21]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[22]  Shubo Liu,et al.  A Differentially Private Unscented Kalman Filter for Streaming Data in IoT , 2018, IEEE Access.

[23]  Xia Feng,et al.  A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..

[24]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[25]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[26]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[27]  Xue Zhang,et al.  ERDT: Energy-Efficient Reliable Decision Transmission for Intelligent Cooperative Spectrum Sensing in Industrial IoT , 2015, IEEE Access.

[28]  P. Alam,et al.  R , 1823, The Herodotus Encyclopedia.

[29]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.