[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3616388.3617520acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

SLOW-Based Pseudonym Changing Schemes for Location Privacy in Vehicular Networks

Published: 30 October 2023 Publication History

Abstract

Location privacy is a critical aspect of vehicular networks. Privacy schemes adopt diverse methods to minimize vehicle traceability. These schemes include pseudonym periodical changes, silent periods, context-based approaches, and cooperative pseudonym changes. It is important to maintain a discontinuity in the information sent by the vehicle to avoid reconstructing the vehicle trace. In this paper, we propose three privacy schemes that use SLOW as a baseline and combine it with other techniques: SLOW-based random silent periods, SLOW-based cooperative pseudonym change, and SLOW-based context-aware privacy scheme. These proposed schemes aim to enhance the original scheme by restricting their operations with intervals and thresholds and improving the management of silent periods. We evaluate the proposed schemes' performance in terms of traceability, computation time, pseudonym usage, and silence time. Results show that our schemes improve the original scheme in most tested metrics. The average improvement in traceability is 70%. Furthermore, our schemes reduce the silent period of the SLOW scheme by 17.40% on average.

References

[1]
L. Buttyan, T. Holczer, A. Weimerskirch, and W. Whyte. 2009. SLOW: A practical pseudonym changing scheme for location privacy in VANETs. In IEEE Vehicular Networking Conference (VNC).
[2]
Levente Buttyán, Tamás Holczer, and István Vajda. 2007. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In Security and Privacy in Ad-hoc and Sensor Networks. Springer Berlin Heidelberg, Berlin, Heidelberg, 129--141. isbn: 978--3--540--73275--4.
[3]
K. Emara, W. Woerndl, and J. Schlichter. 2015. Caps: context-aware privacy scheme for VANET safety applications. In Proceedings of the 8th ACM Conference on Security Privacy in Wireless and Mobile Networks (WiSec '15). ACM, New York, 12 pages. isbn: 9781450336239.
[4]
K. Emara, W. Woerndl, and J. Schlichter. 2016. Context-based pseudonym changing scheme for vehicular adhoc networks, (July 2016). arXiv: 1607.07656.
[5]
Karim Emara. 2016. Poster: prext: privacy extension for Veins VANET simulator. In 2016 IEEE Vehicular Networking Conference (VNC), 1--2. 16.7835979.
[6]
Karim Emara,WolfgangWoerndl, and Johann Schlichter. 2013. Vehicle tracking using vehicular network beacons. 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013. isbn: 9781467358279.
[7]
Hilman Fauzi and Uzma Batool. 2019. A three-bar truss design using singlesolution simulated kalman filter optimizer. MEKATRONIKA, 1, 2, (July 2019), 98--102.
[8]
Matthias Gerlach and Felix Guttler. 2007. Privacy in VANETs using changing pseudonyms - ideal and real. In 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring. IEEE, (Apr. 2007).
[9]
Leping H., K. Matsuura, H. Yamane, and K. Sezaki. 2005. Enhancing wireless location privacy using silent period. In IEEE Wireless Communications and Networking Conference. Vol. 2, 1187--1192.
[10]
F Julien, M Raya, M Felegyhazi, and P Papadimitratos. 2007. Mixzones for location privacy in vehicular networks. In ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS).
[11]
Mohammad Khodaei and Panos Papadimitratos. 2021. Cooperative location privacy in vehicular networks: why simple mix zones are not enough. IEEE Internet of Things Journal, 8, 10, 7985--8004.
[12]
P. S. Kumar, L. Parthiban, and V. Jegatheeswari. 2019. Context aware privacy and security using p-gene based on pseudonym in vanets. In 2019 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS). IEEE, (Apr. 2019).
[13]
Pablo Alvarez Lopez et al. 2018. Microscopic traffic simulation using SUMO. In The 21st IEEE International Conference on Intelligent Transportation Systems. IEEE. https://elib.dlr.de/124092/.
[14]
Jordan Montenegro, Cristhian Iza, and Mónica Aguilar Igartua. 2020. Detection of position falsification attacks in VANETs applying trust model and machine learning. In (PE-WASUN'20). Association for Computing Machinery, Alicante, Spain, 9--16. isbn: 9781450381185.
[15]
OpenStreetMap contributors. 2017. https://www.openstreetmap.org. (2017).
[16]
Yuanyuan Pan and Jianqing Li. 2013. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36, 6, 1599--1609.
[17]
Fengzhong Qu, Zhihui Wu, Feiyue Wang, and Woong Cho. 2015. A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16, 6, (Dec. 2015), 2985--2996.
[18]
Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, and Kaoru Sezaki. 2005. CARAVAN: Providing location privacy for VANET. Tech. rep. Washington Univ Seattle Dept of Electrical Engineering.
[19]
Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha Poovendran. 2007. AMOEBA: robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications, 25, 8, (Oct. 2007), 1569--1589. ac.2007.071007.
[20]
F. Scheuer, K.-P. Fuchs, and H. Federrath. 2011. A safety-preserving mix zone for VANETs. In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 37--48.
[21]
Christoph Sommer, Reinhard German, and Falko Dressler. 2011. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Transactions on Mobile Computing (TMC), 10, 1, (Jan. 2011), 3--15.
[22]
Thorsten Strufe, Alex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra- Arnau, and Jordi Forné. 2023. SoK: Differentially private publication of trajectory data. In Proceedings on Privacy Enhancing Technologies, 496--516.
[23]
Ikram Ullah, Munam Ali Shah, and Abid Khan. 2021. Adaptive grouping and pseudonym changing policy for protection of vehicles location information in VANETs. In IEEE, (Dec. 2021).
[24]
A. Varga and R. Hornig. 2008. An overview of the OMNeT simulation environment. In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, 1--10.
[25]
Albert Wasef and Xuemin (Sherman) Shen. 2009. REP: location privacy for VANETs using random encryption periods. Mobile Networks and Applications, 15, 1, (May 2009), 172--185.
[26]
Hui Zang and Jean Bolot. 2011. Anonymization of location data does not work: a large-scale measurement study. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MobiCom '11). Association for Computing Machinery, Las Vegas, Nevada, USA, 145--156. isbn: 9781450304924.

Cited By

View all
  • (2024)On The Performance of Perception Systems of Autonomous VehiclesICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622924(5365-5370)Online publication date: 9-Jun-2024
  • (2024)SkyCloaking: A UAV-Assisted Privacy-Preserving Strategy for Location-Based Service UsersICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622488(2580-2585)Online publication date: 9-Jun-2024

Index Terms

  1. SLOW-Based Pseudonym Changing Schemes for Location Privacy in Vehicular Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems
    October 2023
    330 pages
    ISBN:9798400703669
    DOI:10.1145/3616388
    Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. location privacy
    2. omnet++
    3. prext
    4. pseudonym change scheme
    5. slow
    6. vehicular networks
    7. veins

    Qualifiers

    • Research-article

    Funding Sources

    • Anonymization technology for AI-based analytics of mobility data (MOBILYTICS)

    Conference

    MSWiM '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 398 of 1,577 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)On The Performance of Perception Systems of Autonomous VehiclesICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622924(5365-5370)Online publication date: 9-Jun-2024
    • (2024)SkyCloaking: A UAV-Assisted Privacy-Preserving Strategy for Location-Based Service UsersICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622488(2580-2585)Online publication date: 9-Jun-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media