A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

被引:42
作者
Wang, Shibin [1 ]
Yao, Nianmin [1 ]
Gong, Ning [1 ]
Gao, Zhenguo [1 ]
机构
[1] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian, Liaoning, Peoples R China
关键词
Trigger-based; Pseudonym exchange; Location privacy; VANETs;
D O I
10.1007/s12083-017-0557-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the same pseudonym is constantly used for a vehicle, the adversary can easily track it. To improve location privacy, a lot of pseudonym change schemes have been proposed. However, the tracker can match vehicles by the beacon message when it has found that the pseudonym is changed. Besides, every vehicle must hold lots of pseudonyms to change in these schemes. In this paper, we propose a trigger-based pseudonym exchange scheme, which aims to thwart to track vehicle from the sending beacons and reduce the storage consumption. We propose two trigger-based algorithms to decide when and how a vehicle exchange pseudonym with others. To evaluate the performance of our scheme, we conduct the probability of exchanging pseudonym in a road segment and a traffic intersection, and measure the tracking percent by an empirical tracker. The simulation results show that our scheme is resilient to confuse the tracker efficiently.
引用
收藏
页码:548 / 560
页数:13
相关论文
共 26 条
[1]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[2]  
[Anonymous], IEEE ACS INT C COMP
[3]  
Carianha A.M., 2011, P 30 INT PERFORMANCE, P1
[4]  
Eckhoff D., 2010, Proceedings 2010 IEEE Vehicular Networking Conference (VNC 2010), P174, DOI 10.1109/VNC.2010.5698239
[5]   On evaluation of location privacy preserving schemes for VANET safety applications [J].
Emara, Karim ;
Woerndl, Wolfgang ;
Schlichter, Johann .
COMPUTER COMMUNICATIONS, 2015, 63 :11-23
[6]   An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks [J].
Farooq, Mohd Umar ;
Pasha, Mohammad ;
Khan, Khaleel Ur Rahman ;
Atif, Mahboob ul Haq .
MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 :994-+
[7]  
Freudiger J, 2007, WIN ITS
[8]   PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs [J].
Huang, Dijiang ;
Misra, Satyajayant ;
Verma, Mayank ;
Xue, Guoliang .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2011, 12 (03) :736-746
[9]   An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs [J].
Jiang, Shunrong ;
Zhu, Xiaoyan ;
Wang, Liangmin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (08) :2193-2204
[10]  
Li M., 2006, P 5 ACM WPES 06, P19