Skip to main content
Log in

A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular networks has been recently proposed to connect vehicles and form ad-hoc networks. Many safety and information-entertainment related applications have thus been proposed. These applications, however, potentially have unique privacy challenges. For example, the vehicle’s network identity is strictly linked to the owner’s identity due to the insurance liability. In this paper, we propose cross-layer privacy protection protocols including initialization, joining and exiting protocols. In addition, we also analytically discuss the optimization of the quantity of pseudonyms to save costs. The analytical and numerical results showed the effectiveness of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. As we shall point out later, this is a minor restriction that can be easily removed.

References

  1. Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., & Khalil, I. (2012). Datacenter at the airport: Reasoning about time-dependent parking lot occupancy. IEEE Transactions on Parallel and Distributed Systems, 99, 2067–2080.

    Article  Google Scholar 

  2. Yan, G., Rawat, D. B., Bista, B. B., & Alnusair, A. (2013). Mining vehicular data in vanet. In Proceedings of the TENCON 2013, Xian, Shaanxi.

  3. Wen, D., Yan, G., Zheng, N., Shen, L., & Li, L. (2011). Towards cognitive vehicles. IEEE Intelligent Systems Magazine, 26(3), 76–80.

    Article  Google Scholar 

  4. Yan, G., Yang, W., Rawat, D. B., & Olariu, S. (2011). Smartparking: A secure and intelligent parking system. IEEE Intelligent Transportation Systems Magazine, 3(1), 18–30.

    Article  Google Scholar 

  5. Choi, J. Y., Golle, P., & Jakobsson, M. (2006). Tamper-evident digital signatures: Protecting certification authorities against malware. In Proceedings of the IEEE international symposium on dependable, autonomic and secure computing (DASC) (pp. 37–44).

  6. Raya, M., Papadimitratos, P., & Hubaux, J.-P. (2006). Securing vehicular communications. IEEE Wireless Communications Magazine, 13, 8–15.

    Article  Google Scholar 

  7. Sun, J., Zhang, C., Zhang, Y., & Fang, Y. M. (2010). An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel Distributed System, 21, 1227–1239.

    Article  Google Scholar 

  8. Yan, G., Olariu, S., & Weigle, M. C. (2008). Providing VANET security through active position detection. Computer Communications, 31(12), 2883–2897.

    Article  Google Scholar 

  9. Yan, G., Olariu, S., & Weigle, M. (2009). Providing location security in vehicular ad hoc networks. IEEE Wireless Communications, 16(6), 48–55.

    Article  Google Scholar 

  10. Xie, H., Kulik, L., & Tanin, E. (2010). Privacy-aware traffic monitoring. IEEE Transactions on Intelligent Transportation Systems, 11(1), 61–70.

    Article  Google Scholar 

  11. Yan, G., & Olariu, S. (2011). A probabilistic analysis of link duration in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1227–1236.

    Article  Google Scholar 

  12. Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14, 284–294. (Impact Factor: 3.452).

    Article  Google Scholar 

  13. Rawat, D. B., Popescu, D., Gongjun, Y., & Olariu, S. (2011). Enhancing vanet performance by joint adaptation of transmission power and contention window size. IEEE Transactions on Parallel and Distributed Systems, 22(9), 1528–1535.

    Article  Google Scholar 

  14. Yan, G., Olariu, S., & Popescu, D. (2012). NOTICE: An architecture for the notification of traffic incidents. In IEEE intelligent transportation systems magazine.

  15. Le, Z., Ouyang, Y., Chen, G., & Makedon, F. (2011). Dynamic mix zone: Location data sanitizing in assisted environments. Universal Access in the Information Society, 10(2), 195–205.

    Article  Google Scholar 

  16. Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceedings of the 15th European conference on research in computer security ser. ESORICS’10 (pp. 55–70).

  17. Palanisamy, B., & Liu, L. (2011). Mobimix: Protecting location privacy with mix-zones over road networks. In Proceedings of the 27th international conference on data engineering (ICDE 2011), Hannover (pp. 494–505).

  18. Sun, Y., Su, X., Zhao, B., & Su, J. (2010). Mix-zones deployment for location privacy preservation in vehicular communications. In CIT 2010, West Yorkshire (pp. 2825–2830).

  19. Ribagorda-Garnacho, A. (2010). Authentication and privacy in vehicular networks. Journal of UPGRADE, XI(1), 72–79.

    Google Scholar 

  20. Sampigethaya, K., Li, M., Huang, L., & Poovendran, R. (2007). Amoeba: Robust location privacy scheme for vanet. IEEE Journal on Selected Areas in Communications, 25(8), 1569–1589.

    Article  Google Scholar 

  21. Horster, P., Petersen, H., & Michels, M. (1994). Meta-elgamal signature schemes. In Proceedings of the 2nd ACM conference on computer and communications security, ser. CCS ’94. New York, NY: ACM (pp. 96–107). [Online]. doi:10.1145/191177.191197

  22. Dok, H., Fu, H., Echevarria, R., & Weerasinghe, H. (2010). Privacy issues of vehicular ad-hoc networks. International Journal of Future Generation Communication and Networking, 3(1), 17–32.

    Google Scholar 

  23. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K. & Sezaki, K. (2005). Caravan: Providing location privacy for vanet. In Embedded security in cars (ESCAR.

  24. Blanchet, B., Abadi, M., & Fournet, C. (2008). Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1), 3–51.

    Article  MathSciNet  MATH  Google Scholar 

  25. Arapinis, M., Chothia, T., Ritter, E., & Ryan, M. (2010). Analysing unlinkability and anonymity using the applied pi calculus. In CSF (pp. 107–121).

  26. Brusò, M., Chatzikokolakis, K., & den Hartog, J. (2010). Formal verification of privacy for RFID systems. In CSF (pp. 75–88).

  27. Delaune, S., Kremer, S., & Ryan, M. (2010). Verifying privacy-type properties of electronic voting protocols: A taster. In Towards trustworthy elections (pp. 289–309).

  28. Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008. 27th IEEE international conference on computer communications, joint conference of the IEEE computer and communications societies, 13–18 April 2008, Phoenix, AZ (pp. 1229–1237).

  29. Lu, R., Lin, X., Luan, T., Liang, X., Li, X., Chen, L., & Shen, X. (2012). Prefilter: An efficient privacy-preserving relay filtering scheme for delay tolerant networks. In INFOCOM 2012.

  30. Lu, R., Lin, X., Liang, X., & Shen, X. S. (2012). A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.

    Article  Google Scholar 

  31. Lin, X., Lu, R., Liang, X., & Shen, X. (2011). Stap: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in vanets. INFOCOM, 2011, 2147–2155.

    Google Scholar 

  32. Lu, R., Lin, X., & Shen, X. (2010). Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. INFOCOM, 2010, 632–640.

    Google Scholar 

  33. Lei, M., Hong, X., & Vrbsky, S. V. (2007) Protecting location privacy with dynamic mac address exchanging in wireless networks. In Proceedings of the global communications conference, 2007. GLOBECOM ’07, Washington, DC (pp. 49–53).

  34. Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. (2011). Specs: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.

    Article  Google Scholar 

  35. Xue, X., & Ding, J. (2012). Lpa: A new location-based privacy-preserving authentication protocol in vanet. Security and Communication Networks, 5(1), 69–78.

    Article  Google Scholar 

  36. Nikaein, N., Kanti Datta, S., Marecar, I., & Bonnet, C. (2013). Application distribution model and related security attacks in VANET (pp. 1–6).

  37. Yan, G., Olariu, S., & Weigle, M. C. (2009). Providing location security in vehicular ad-hoc networks. IEEE Wireless Communications, 16(6), 48–55.

    Article  Google Scholar 

  38. Yan, G., Rawat, D. B., & Bista, B. B. (2012). Towards secure vehicular clouds. In Proceedings of the sixth international conference on complex, intelligent, and software intensive systems (CISIS-2012), Sanpaolo Palace Hotel, Palermo.

  39. Olariu, S., Hristov, T., & Yan, G. (2012). The next paradigm shift: From vehicular networks to vehicular clouds. In S. Basagni, S. G. Marco Conti, & I. Stojmenovic (Eds.), Mobile Ad hoc networking: The cutting edge directions. Hoboken: Wiley.

    Google Scholar 

  40. Yan, G., Rawat, D. B., Shi, H., & Chong, D. (2017). A cross-layer and optimized privacy method in Vehicular ad-hoc Networks. In 2nd International Conference on IEEE Image, Vision and Computing (ICIVC), 2017 (pp. 894–898).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gongjun Yan.

Appendix

Appendix

A list of notations is shown below for better read:

  • IA is the identity authority which is the only trusted agents in the system and is the only agent that keeps the real identity of a vehicle

  • CA is the certificate authority that can be acted by the elected cell leader which can be partially trusted and be fully monitored by other vehicles

  • p is a big prime number

  • M is the pseudonym proposal defined by users.

  • m is the new message defined by IA, i.e. \(m=\{M,x,TTL\}\). To avoid pseudonym collision, a random number x is added. To avoid pseudonym lasts too long time, a time-to-live counter TTL is added.

  • x is a random number that IA appends to M.

  • TTL is a time-to-live counter that IA appends to M.

  • e is the primitive element which is used in our generating function f(x).

  • g is the group information which is know by all the group members

  • \(f(g) = 2^k + 2h(g)+ 1\)

  • \(f^{\prime }(g) = f(g) + \delta\)

  • \(\delta\) is a random number such that \(gcd(f^{\prime }(g),p-1) = 1\)

  • c is the private key of the vehicle i

  • k is the maximum length of message g

  • d is the public key of the vehicle i and \(d=e^c mod p\)

  • \(\{\alpha , \beta , \gamma \}\) are random numbers selected by IA

  • \(\sigma\) is a random number with condition \(gcd(e^\sigma \text{ mod } p,p-1) = 1\)

  • m is the pseudonym that vehicle i proposes to use

  • \(a=e^\sigma \text{ mod } p\) is generated by CA and sent to IA.

  • \(a^{\prime } = a^\alpha d^{\gamma f^{\prime }(g)} e^\beta \text{ mod } p\) is generated by IA and is sent to CA and the public

  • \(m^{\prime }=\left( \frac{a^{\prime }m-\gamma }{a \alpha }\right) \text{ mod } (p-1)\) is generated by IA and sent to CA

  • \(b=\left( am^{\prime }cf^{\prime }(g)-k \right) \text{ mod } (p-1)\) is generated by CA and sent to IA

  • \(b^{\prime } = \frac{\alpha b -\beta }{f^{\prime }(g)} \text{ mod } (p-1)\) is generated by IA and is published to public

Lemma 9

$$\begin{aligned} \alpha b = [b^{\prime } f^{\prime }(g) + \beta ] \text{ mod } (p-1) \end{aligned}$$

Proof

$$\begin{aligned} RHS= &\, [b^{\prime } f^{\prime }(g) + \beta ] \text{ mod } (p-1)\\= &\, \alpha \frac{b^{\prime } f^{\prime }(g) + \beta }{\alpha } \text{ mod } (p-1)\\= &\, \alpha \frac{ \frac{\alpha b -\beta }{f^{\prime }(g)} f^{\prime }(g) + \beta }{\alpha } \text{ mod } (p-1)\\= &\, \alpha b \\= &\, LHS\\ \end{aligned}$$

Therefore, \(LHS\equiv RHS\). \(\square\)

Lemma 10

$$\begin{aligned} \alpha b = \left[ a^{\prime } m f^{\prime }(g) c - \alpha k - c \gamma f^{\prime }(g) \right] \text{ mod } (p-1) \end{aligned}$$

Proof

$$\begin{aligned} RHS= &\, \left[ a^{\prime } m f^{\prime }(g) c - \alpha k - c \gamma f^{\prime }(g) \right] \text{ mod } (p-1)\\= &\, \alpha \frac{a^{\prime } m f^{\prime }(g) c - \alpha k - c \gamma f^{\prime }(g)}{\alpha } \text{ mod } (p-1)\\= &\, \left[ \alpha \left[ \frac{a^{\prime } m f^{\prime }(g) c - c \gamma f^{\prime }(g)}{\alpha } \right] -k\right] \text{ mod } (p-1)\\= &\, \left[ \alpha \left[ \frac{(a^{\prime } m - \gamma )f^{\prime }(g) c}{\alpha } \right] -k\right] \text{ mod } (p-1)\\= &\, \left[ \alpha \left[ \frac{a(a^{\prime } m - \gamma )f^{\prime }(g) c}{a \alpha } \right] -k\right] \text{ mod } (p-1)\\= &\, \alpha \left[ a m^{\prime } c f^{\prime }(g) -k\right] \text{ mod } (p-1)\\= &\, \alpha b \\= &\, LHS \end{aligned}$$

\(\square\)

Lemma 11

$$\begin{aligned} a^{\prime } m f^{\prime }(g) c = \left[ b^{\prime } f^{\prime }(g) + \beta + \alpha k + c \gamma f^{\prime }(g) \right] mod (p-1) \end{aligned}$$

Proof

To prove this lemma, we refer lemma 9 and 10. We shuffle them in a different order. We write:

$$\begin{aligned} a^{\prime } m f^{\prime }(g) c = \left[ b^{\prime } f^{\prime }(g) + \beta + \alpha k + c \gamma f^{\prime }(g) \right] \text{ mod } (p-1). \end{aligned}$$

\(\square\)

Lemma 12

\(\{X(t)~|~ t \ge 0\}\) is a Poisson process with parameter

$$\begin{aligned} \varLambda (t) = \lambda \int _{0}^t p(t- u) \left[ 1- F_G(u) \right] \,{\hbox{d}}u. \end{aligned}$$
(5)

Proof

We begin by determining the probability \(\gamma (t)\) that an arbitrary arriving car is marked as it enters the cell and that it will still be resident in the cell at time t. For this purpose, assume that \(n,\ (n \ge 0),\) cars have arrived in (0, t). It is well known that, with this assumption, the individual arrival times of cars are uniformly distributed in (0, t). Now, consider a car arriving at time \(\tau\):

  • with probability \(p(\tau )\) the car is marked;

  • with probability \(\Pr [\{G > t- \tau \}] = 1- F_G(t- \tau )\) the car is still resident in the cell at time t.

Since the event that a car is marked is independent of whether or not the car will be resident in the cell at time t, it is clear that the probability that a generic car arriving at time \(\tau\) is both marked and resident in the cell at time t is

$$\begin{aligned} p(\tau ) \left[ 1- F_G(t- \tau ) \right] . \end{aligned}$$

Now, letting U denote the uniform random variable on (0, t), the Law of Total Probability guarantees that

$$\begin{aligned} \gamma (t)= & \int _{0}^t p(\tau ) \left[ 1- F_G(t- \tau ) \right] \,{\hbox{d}}F_U(\tau ) \\= & \int _{0}^t p(\tau ) \left[ 1- F_G(t- \tau ) \right] \frac{{\hbox{d}}\tau }{t} \\= & \frac{1}{t} \int _{0}^t p(t- u) \left[ 1- F_G(u) \right] \,{\hbox{d}}u. \end{aligned}$$
(6)

We now have all the ingredients necessary to evaluate the probability \(P_k(t) = \Pr [\{X(t) =k\}]\).

$$\begin{aligned} P_k(t)= & \sum _{n \ge 0} \Pr [\{X(t) =k\} ~|arrive(n)] \\&*&\Pr [\{\{n\ {\hbox{cars have arrived in}}\ (0,t)\}] \\= & \sum _{n \ge 0} {n \atopwithdelims ()k} \left[ \gamma (t) \right] ^k \left[ 1- \gamma (t) \right] ^{n-k} \frac{\left[ \lambda t\right] ^n}{n!} e^{- \lambda t} \\= & \frac{\left[ \varLambda (t)\right] ^k}{k!} e^{- \varLambda (t)} \end{aligned}$$
(7)

where \(\varLambda (t)\) has been defined in (5), arrive(n) is \(~\{n\ {\hbox{cars have arrived in}}\ (0,t)\}\).

Observe that (7) tells us that the process \(\{X(t)~|~ t \ge 0\}\) is a Poisson process with parameter \(\varLambda (t)\). This completes the proof of the lemma. \(\square\)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, G., Rawat, D.B. & Lindsey, W. A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc Networks. Wireless Pers Commun 97, 3331–3353 (2017). https://doi.org/10.1007/s11277-017-4599-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4599-z

Keywords

Navigation