STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs

Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver's location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving receiver-location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the receiver's exact location information, a packet can be first forwarded and disseminated in the social tier. Later, once the receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the receiver's location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

[1]  Cristian Borcea,et al.  VANET Routing on City Roads Using Real-Time Vehicular Traffic Information , 2009, IEEE Transactions on Vehicular Technology.

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Xinwen Fu,et al.  CAP: A Context-Aware Privacy Protection System for Location-Based Services , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[5]  Hewijin Christine Jiau,et al.  Geographic Forwarding With Dead-End Reduction in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Vehicular Technology.

[6]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[7]  Xiaoli Ma,et al.  An Efficient Path Pruning Algorithm for Geographical Routing in Wireless Networks , 2008, IEEE Transactions on Vehicular Technology.

[8]  Liviu Iftode,et al.  CARS: Context-Aware Rate Selection for vehicular networks , 2008, 2008 IEEE International Conference on Network Protocols.

[9]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[10]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[11]  Xiaohui Liang,et al.  Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[12]  Jean-Jacques Quisquater,et al.  The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..

[13]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Jing Zhao,et al.  VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks , 2008, IEEE Trans. Veh. Technol..

[15]  Donald F. Towsley,et al.  Performance Modeling of Epidemic Routing , 2006, Networking.