A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the same pseudonym is constantly used for a vehicle, the adversary can easily track it. To improve location privacy, a lot of pseudonym change schemes have been proposed. However, the tracker can match vehicles by the beacon message when it has found that the pseudonym is changed. Besides, every vehicle must hold lots of pseudonyms to change in these schemes. In this paper, we propose a trigger-based pseudonym exchange scheme, which aims to thwart to track vehicle from the sending beacons and reduce the storage consumption. We propose two trigger-based algorithms to decide when and how a vehicle exchange pseudonym with others. To evaluate the performance of our scheme, we conduct the probability of exchanging pseudonym in a road segment and a traffic intersection, and measure the tracking percent by an empirical tracker. The simulation results show that our scheme is resilient to confuse the tracker efficiently.

[1]  Y. Bevish Jinila,et al.  An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet , 2014 .

[2]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[3]  Feng Zhenming Secure and privacy-preserving scheme based on pseudonyms exchanges for VANET , 2012 .

[4]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[5]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[6]  George Lima,et al.  Improving location privacy in mix-zones for VANETs , 2011, 30th IEEE International Performance Computing and Communications Conference.

[7]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[8]  Fei-Yue Wang Scanning the Issue and Beyond: Crowdsourcing for Field Transportation Studies and Services , 2015, IEEE Trans. Intell. Transp. Syst..

[9]  Hassan Artail,et al.  LPS for LBS: Location-Privacy scheme for location-based services , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[10]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[11]  Karim Emara,et al.  On evaluation of location privacy preserving schemes for VANET safety applications , 2015, Comput. Commun..

[12]  Marko Wolf,et al.  Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.

[13]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[14]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[15]  Jianqing Li,et al.  Effectively Changing Pseudonyms for Privacy Protection in VANETs , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[16]  Jianqing Li,et al.  Cooperative pseudonym change scheme based on the number of neighbors in VANETs , 2013, J. Netw. Comput. Appl..

[17]  Li Feng,et al.  An analytical model for random pseudonym change scheme in VANETs , 2013, Cluster Computing.

[18]  Reinhard German,et al.  Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.

[19]  Bofeng Zhang,et al.  Mix-zones optimal deployment for protecting location privacy in VANET , 2014, Peer-to-Peer Networking and Applications.

[20]  Radha Poovendran,et al.  Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.

[21]  Khaleel Ur Rahman Khan,et al.  An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks , 2011 .

[22]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[23]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[24]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[25]  R. M. Somasundaram,et al.  Pseudonyms Based Blind Signature Approach for an Improved Secured Communication at Social Spots in VANETs , 2015, Wirel. Pers. Commun..

[26]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..