Abstract
A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location through the communication broadcast is a threat to privacy. A vehicle can preserve its anonymity by being indistinguishable in the neighborhood crowd through continual change of identity and by hiding among its neighbors. This paper addresses the challenges in providing anonymity to a moving vehicle that uses a temporary identity for transmission and continually changes this pseudonym. As a vehicle moves on a road, its neighbors change in accordance to its relative speed with neighboring vehicles. The nature and size of the neighborhood changes the effective crowd provided by the vehicles constituting this neighborhood. Since, all neighboring vehicles do not contribute to the anonymity; the degree of anonymity is reduced. The work focuses on updation of pseudonym by a vehicle in order to sustain or enhance its anonymity by decorrelating the relation between its physical location and identity. A heuristic that allows a vehicle to switch its pseudonym at a time and place where the anonymity can be enhanced is proposed. Results indicate that updating pseudonyms in accordance to the heuristic enhances the anonymity of a vehicle.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of SASN 2005, pp. 11–21 (2005)
Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39–68 (2007)
Dotzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)
Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for Secure and Private Vehicular Communications. In: International Conference on ITS Telecommunications (ITST 2007), Sophia Antipolis, France (2007)
Andreas, P., Marit, H.: Anonymity, unobservability, and pseudonymity: A proposal for terminology, Draft, v0.21, HBCC 2004 (2004)
Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In: Proceedings of 65th Vehicular Technology Conference VTC 2007-Spring, pp. 2521–2525 (2007)
Kewei, S., Yong, X., Weisong, S., Loren, S., Tao, Z.: Adaptive Privacy-Preserving Authentication in Vehicular Networks. In: Proceedings of IEEE International Workshop on Vehicle Communication and Applications (2006)
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)
Jinyuan, S., Chi, Z., Yuguang, F.: An id-based framework achieving privacy and non-repudiation in Vehicular ad hoc networks. In: Military Communications Conference, MILCOM 2007. IEEE, Los Alamitos (2007)
Emanuel, F., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (WCNC) (2007)
Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES 2006, Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 19–27 (2006)
Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-Zones for Location Privacy in Vehicular Networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007), Vancouver (2007)
Bettstetter, C., Resta, G., Santi, P.: The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. on Mobile Computing 2(3), 257–269 (2003)
Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Silent cascade: Enhancing location privacy without communication qoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 165–180. Springer, Heidelberg (2006)
Berthold, O., Federrath, H., Köpsell, S.: Web mIXes: A system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)
Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Sezaki, K.: CARAVAN: Providing location privacy for VANET. WPES 2006. In: Proc. of Embedded Security in Cars (ESCAR) (2005)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys., pp. 31–42 (2003)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech. Report SRI-CSL-98-04, CS Lab, SRI International (1998)
Wu, X., Elisa, B.: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. On Dependable and Secure Computing 4(4), 252–264 (2007)
Khabazian, M., Ali, M.K.: Generalized Performance Modeling of Vehicular Ad Hoc Networks (VANETs). In: ISCC 2007, pp. 51–56 (2007)
Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons, Chichester (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chaurasia, B.K., Verma, S., Tomar, G.S., Abraham, A. (2009). Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science IV. Lecture Notes in Computer Science, vol 5430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01004-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-01004-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01003-3
Online ISBN: 978-3-642-01004-0
eBook Packages: Computer ScienceComputer Science (R0)