Abstract
A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks.















Similar content being viewed by others
References
Memon, I., Arain, Q. A., Memon, M. H., et al. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30(16), 3312.
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.
Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless personal communications, 79, 647–660.
Memon, I. (2015a). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.
Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 1–34.
Das, A. K. (2015). A secure and effective biometric based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems, 30(1), e2993.
Memon, I., & Memon, H. (2017). An effective and secure user authenticated protocol for location based services in road networks. arXiv preprint arXiv:1706.02646.
Memon, I. (2018). Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems, 31(11), e3704.
Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95(4), 3713–3732.
Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and communication networks, 6, 777–789.
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80, 1347–1362.
Arain, Q. A., Zhongliang, D., Memon, I., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–522.
Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking, 22, 391–404.
Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.
Talipov, E., Shin, H., Han, S., & Cha, H. (2011). A lightweight stateful address autoconfiguration for 6LoWPAN. Wireless Networks, 17, 183–197.
Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 11(1), 1–22.
Mishra, D., Chaturvedi, A., & Mukhopadhyay, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.
Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure IPv6 address configuration protocol for vehicular networks. Wireless personal communications, 79, 721–744.
X. Wu, K. N. Brown, C. J. Sreenan, P. Alvarez, M. Ruffini, N. Marchetti, et al., "An XG-PON module for the NS-3 network simulator," in Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013, pp. 195–202.
Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless personal communications, 74, 731–755.
Chen, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63, 407–426.
Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications, 77, 197–224.
Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation in VANET. Wireless personal communications, 72, 315–341.
Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.
Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.
Dai, W. Crypto?? 5.6. 0 benchmarks. https://www.cryptopp.com/benchmarks.html.
Miracl benchmarks. www.shamus.ie/index.php.
OpenSSL: The open source toolkit for SSL/TLS [Online]. Available:https://www.openssl.org/
Cygwin: Linux Environment emulator for windows. https://www.cygwin.com/.
Yan, Y., Zhang, B., Zheng, J., & Ma, J. (2010). CORE: A coding-aware opportunistic routing mechanism for wireless mesh networks [Accepted from Open Call]. IEEE Wireless Communications, 17(3), 96–103.
J. Manssour, A. Osseiran and S. B. Slimane, (2009). Opportunistic relay selection for wireless networkcoding, Communications (MICC), IEEE 9th Malaysia International Conference on, Kuala Lumpur, pp.102–106
Zhang, J., Chen, Y. P., & Marsic, I. (2010). MAC-layer proactive mixing for network coding inmulti-hop wireless networks. Computer Networks, 54(2), 196–207.
Acknowledgements
We thank reviewers for their valuable comments/suggestions on the early version of the paper
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The author declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Memon, I., Memon, H. & Arain, Q.A. Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks. Wireless Pers Commun 116, 3309–3329 (2021). https://doi.org/10.1007/s11277-020-07854-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07854-6