Skip to main content

Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET

  • Conference paper
Information Security Applications (WISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5932))

Included in the following conference series:

Abstract

Inspiring from MANET (Mobile Ad hoc NETworks), VANET (Vehicular Ad hoc NETworks) employing vehicles as nodes, provide a wide range of applications in transportation system. The security of VANET has been a hot topic among the research community. VANETs must meet the basic security requirements such as authentication, integrity, confidentiality and privacy. In VANET, vehicles send beacon messages periodically every 100-300ms which carry speed and position information used for safe driving. The privacy of user is abused by profile generation where the adversary makes movement profiles against the vehicle using the identity information in the beacon. We outline the strategies using pseudonyms to provide privacy of user. After finding out deficiencies in pseudonym-based schemes, we propose a pseudonymless strategy to avoid profilation. In our scheme, we assume that each car is equipped with TRH (Tamper-Resistant Hardware) carrying out secure operations. Our proposed scheme assures the avoidance of profile generation without using mix zones and silent periods. We show that our proposed scheme is computationally efficient and less bandwidth consuming than other systems.

This research was supported by the Korea Research Foundation Grant funded by the Korean Government (KRF-2008-313-D01024).The research was also supported by Ministry of Knowledge Economy, Korea, under the HNRC (Home Network Research Center)- ITRC (Information Technology Research Center) support program supervised by the Institute of Information Technology Assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31, 2803–2814 (2008)

    Article  Google Scholar 

  2. Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security 15, 39–68 (2007)

    Google Scholar 

  3. Leinmuller, T., Schoch, E., Maihofer, C.: Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks. In: Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2007), pp. 84–91 (2007)

    Google Scholar 

  4. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communication Magazine 46, 110–118 (2008)

    Google Scholar 

  5. NOW: Network on Wheels Project, http://www.network-on-wheels.de/

  6. EPFL Vehicular Networks Security Project, http://ivc.epfl.ch/

  7. CALIFORNIA PATH (Partners for Advanced Transit and Highways), http://www.path.berkeley.edu/

  8. SeVeCom (Secure Vehicle Communication) Project, http://www.sevecom.org/

  9. Rass, S., Fuchs, S., Schaffer, M., Myamakya, K.: How to Protect Privacy in Floating Car Data Systems. In: Fifth ACM international workshop on Vehicular Inter NETworking, pp. 17–22 (2008)

    Google Scholar 

  10. Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Buttyan, L., Holczer, T., Vajda, I.: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129–141. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Beresford, A.R., Stajano, F.: Mix Zones: User Privacy in Location-aware Services. In: Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)

    Google Scholar 

  13. Lo, N.-W., Tsai, H.-C.: Illusion Attack on VANET Applications - A Message Plausibility Problem. In: IEEE Globecom Workshops, pp. 1–8 (2007)

    Google Scholar 

  14. Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening Privacy Protection in VANETs. In: IEEE International Conference on Wireless and Mobile Computing, pp. 508–513 (2008)

    Google Scholar 

  15. Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Fourth Workshop on Vehicle to Vehicle Communications (V2VCOM 2008), (2008)

    Google Scholar 

  16. Chaurasia, B.K., Verma, S., Bhasker, S.M.: Maximizing Anonymity of a Vehicle. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 95–98 (2008)

    Google Scholar 

  17. Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 131–136 (2008)

    Google Scholar 

  18. Schoch, E., et al.: Impact of Pseudonym Changes on Geographic Routing in VANETs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 43–57. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Liu, B., Zhong, Y., Zhang, S.: Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs. In: 7th IEEE International Conference on Computer and Information Technology, pp. 967–972 (2007)

    Google Scholar 

  20. Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In: IEEE 65th Vehicular Technology Conference, pp. 2521–2525 (2007)

    Google Scholar 

  21. Scheuer, F., Plobi, K., Federrath, H.: Preventing Profile Generation in Vehicular Networks. In: IEEE International Conference on Wireless and Mobile Computing, pp. 520–525 (2008)

    Google Scholar 

  22. Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (WCNC 2007), pp. 3400–3405 (2007)

    Google Scholar 

  23. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and Robust Pseudonymous Authentication in VANET. In: Fourth ACM International Workshop on Vehicular ad Hoc Networks, pp. 19–28 (2007)

    Google Scholar 

  24. Ma, Z., Kargl, F., Weber, M.: Pseudonym-on-demand: A New Pseudonym Refill Strategy for Vehicular Communications. In: IEEE 68th Vehicular Technology Conference (VTC 2008), pp. 1–5 (2008)

    Google Scholar 

  25. Chaurasia, B.K., Verma, S.: Optimizing Pseudonym Updation for Anonymity in VANETS. In: IEEE Asia-Pacific Services Computing Conference, pp. 1633–1637 (2008)

    Google Scholar 

  26. Eichler, S.: Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility. In: IEEE Intelligent Vehicles Symposium, pp. 541–546 (2007)

    Google Scholar 

  27. Plobi, K., Federrath, H.: A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Computer Standards and Interfaces 30, 390–397 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hussain, R., Kim, S., Oh, H. (2009). Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. In: Youm, H.Y., Yung, M. (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10838-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10838-9_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10837-2

  • Online ISBN: 978-3-642-10838-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics