CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks

被引:0
作者
Wang, Junchao [1 ]
Li, Honglin [2 ]
Sun, Yan [3 ]
Phillips, Chris [3 ]
Mylonas, Alexios [1 ]
Gritzalis, Dimitris [4 ]
机构
[1] Univ Hertfordshire, Dept Comp Sci, Cybersecur & Comp Syst Res Lab, Hatfield AL10 9AB, England
[2] Univ St Andrews, Sch Comp Sci, St Andrews KY16 9AJ, Scotland
[3] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
[4] Athens Univ Econ & Business, Dept Informat, Athens 10434, Greece
关键词
beacon; mix zone; privacy; pseudonym changing; RNN; transmission overhead; VANET; PROTECTING LOCATION PRIVACY; MIX-ZONES; MESSAGES;
D O I
10.3390/fi17040165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajectories of the victim vehicle. To address this issue, researchers often generate numerous fake beacons to deceive attackers, but this increases transmission overhead significantly. Therefore, we propose the Communication-Efficient Pseudonym-Changing Scheme within the Restricted Online Knowledge Scheme (CPCROK) to protect vehicle privacy without causing significant communication overhead in low-density VANETs by generating highly authentic fake beacons to form a single fabricated trajectory. Specifically, the CPCROK consists of three main modules: firstly, a special Kalman filter module that provides real-time, coarse-grained vehicle trajectory estimates to reduce the need for real-time vehicle state information; secondly, a Recurrent Neural Network (RNN) module that enhances predictions within the mix zone by incorporating offline data engineering and considering online vehicle steering angles; and finally, a trajectory generation module that collaborates with the first two to generate highly convincing fake trajectories outside the mix zone. The experimental results confirm that CPCROK effectively reduces the attack success rate by over 90%, outperforming the plain mix-zone scheme and beating other fake beacon schemes by more than 60%. Additionally, CPCROK effectively minimizes transmission overhead by 67%, all while ensuring a high level of protection.
引用
收藏
页数:24
相关论文
共 58 条
[1]   Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs [J].
Al-Marshoud, Mishri Saleh ;
Al-Bayatti, Ali H. ;
Kiraz, Mehmet Sabir .
ELECTRONICS, 2021, 10 (11)
[2]   Driving Habits Data: Location Privacy Implications and Solutions [J].
Bellatti, Jacob ;
Brunner, Andrew ;
Lewis, Joseph, III ;
Annadata, Prasad ;
Eltarjaman, Wisam ;
Dewri, Rinku ;
Thurimella, Ramakrishna .
IEEE SECURITY & PRIVACY, 2017, 15 (01) :12-20
[3]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[4]   PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks [J].
Boualouache, Abdelwahab ;
Senouci, Sidi-Mohammed ;
Moussaoui, Samira .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (08) :3209-3218
[5]   A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks [J].
Boualouache, Abdelwahab ;
Senouci, Sidi-Mohammed ;
Moussaoui, Samira .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :770-790
[6]  
Buttyán L, 2007, LECT NOTES COMPUT SC, V4572, P129, DOI 10.1007/978-3-540-73275-4_10
[7]  
Chen C.M., 2025, IEEE Trans. Intell. Transp. Syst
[8]   A blockchain-based trusted vehicle service recommendation scheme in intelligent transport systems [J].
Chen, Jinglong ;
Lu, He ;
Xu, Wenxuan ;
Yang, Yang ;
Amoon, Mohammed ;
Kumari, Saru .
SECURITY AND PRIVACY, 2025, 8 (01)
[9]   RECURRENT NEURAL NETWORKS AND ROBUST TIME-SERIES PREDICTION [J].
CONNOR, JT ;
MARTIN, RD ;
ATLAS, LE .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (02) :240-254
[10]  
Deeksha A.Kumar., 2017, IEEE INT CONF SIG PR, P580