Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs

被引:324
作者
Lu, Rongxing [1 ]
Lin, Xiaodong [2 ]
Luan, Tom H. [1 ]
Liang, Xiaohui [1 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Ontario Inst Technol, Fac Business & Informat Technol, Oshawa, ON L1H 7K4, Canada
关键词
Location privacy; security; social spots; vehicular ad hoc networks (VANETs); SHORT SIGNATURES; SCHEME;
D O I
10.1109/TVT.2011.2162864
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a prime target of the quality of privacy in vehicular ad hoc networks (VANETs), location privacy is imperative for VANETs to fully flourish. Although frequent pseudonym changing provides a promising solution for location privacy in VANETs, if the pseudonyms are changed in an improper time or location, such a solution may become invalid. To cope with the issue, in this paper, we present an effective pseudonym changing at social spots (PCS) strategy to achieve the provable location privacy. In particular, we first introduce the social spots where several vehicles may gather, e. g., a road intersection when the traffic light turns red or a free parking lot near a shopping mall. By taking the anonymity set size as the location privacy metric, we then develop two anonymity set analytic models to quantitatively investigate the location privacy that is achieved by the PCS strategy. In addition, we use game-theoretic techniques to prove the feasibility of the PCS strategy in practice. Extensive performance evaluations are conducted to demonstrate that better location privacy can be achieved when a vehicle changes its pseudonyms at some highly social spots and that the proposed PCS strategy can assist vehicles to intelligently change their pseudonyms at the right moment and place.
引用
收藏
页码:86 / 96
页数:11
相关论文
共 31 条
[1]  
[Anonymous], 2009, LECT NOTECOMPUTER
[2]  
[Anonymous], 2006, P 4 WORKSH ESCAR
[3]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177
[6]  
Buttyán L, 2007, LECT NOTES COMPUT SC, V4572, P129, DOI 10.1007/978-3-540-73275-4_10
[7]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[8]   Key Management for UMTS MBMS [J].
Cheng, Shin-Ming ;
Lai, Wei-Ru ;
Lin, Phone ;
Chen, Kwang-Cheng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (09) :3619-3628
[9]  
Eriksson J, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P29
[10]  
Freudiger J., 2007, ACM WORKSH WIR NETW