Skip to main content
Log in

Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we propose an efficient dynamic pseudonymous based multiple mix-zones authentication protocol for privacy preservation to enhance security over road networks. Most of the existing protocols either utilize pseudonym based approaches with certificate revocation list that cause significant communicational and storage overhead or they use group signature based approaches, which are computationally expensive. In this paper, we present a dynamic pseudonymous based multiple mix-zones authentication protocol that only requires mobile vehicles to communicate with reported server for registration and dynamic pseudonym change. Furthermore, we formulate a mechanism to provide users with dynamic pseudonyms named as; base pseudonyms and short time pseudonyms, to achieve users’ privacy. Finally, we analyze our protocol by determining the communication cost as well as various attack scenarios to prove that our approach is most efficient and robust as compared to existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.

    Article  Google Scholar 

  2. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.

    Article  Google Scholar 

  3. Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860.

    Article  Google Scholar 

  4. Kumaresan, G., Kumaresan, G., Adiline, T. MacrigaGroup key authentication scheme for Vanet INtrusion detection (GKAVIN). Wireless Networks. doi:10.1007/s11276-016-1197-z.

  5. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, IEEE Standard 1609.2 (2006).

  6. Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013). Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528).

  7. Liu, Y., Wang, L., & Chen, H.-H. (2015). Message authentication using proxy vehicles in vehicular ad Hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710.

    Article  Google Scholar 

  8. Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web. doi:10.1007/s11280-016-0403-3.

    Google Scholar 

  9. Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications. doi:10.1007/s11042-016-3834-z.

    Google Scholar 

  10. Chim, T. W., Yiu, S. M., Hui, C. K., & Li, O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524.

    Article  MathSciNet  Google Scholar 

  11. Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.

    Article  Google Scholar 

  12. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362.

    Article  Google Scholar 

  13. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., & Hammad, M. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications: An International Journal, 79(1), 661–686.

    Article  Google Scholar 

  14. Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications: An International Journal, 80(1), 85–96.

    Article  Google Scholar 

  15. Kamenyi, D. M., Wang, Y., Fengli, Z., Imran, M., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.

    Google Scholar 

  16. Memon, I., Jamro, D. L., Mangi, F. A., Basit, M. A., Memon, M. H. (2013). Source localization wireless sensor network using time difference of arrivals (TDOA). International Journal of Scientific and Engineering Research, 4(7), 1046–1054.

    Google Scholar 

  17. Domenic, K.,Wang, Y., Zhang, F., Memon, I., Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII2013) (pp. 352–355). Xi’an.

  18. Gustav, Y., Wang, Y., Zhang, F., Domenic, K. M., Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th International Conference on Computational Problem-Solving (ICCP 2013), Jiuzhai.

  19. Dai, W. Crypto++ 5.6. 0 benchmarks. http://www.cryptopp.com/benchmarks.html.

  20. Miracl benchmarks. www.shamus.ie/index.php.

  21. Cygwin: Linux Environment Emulator for Windows. http://www.cygwin.com/.

  22. Simulation of urban mobility (SUMO). http://sumo.sourceforge.net.

Download references

Acknowledgements

This research has been funded by The National High Technology Research and Development Program of China (Nos. 2014AA123103, 2015AA124103) and National Natural Science Foundation of China (Nos. 61401040, 61372110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qasim Ali Arain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arain, Q., Zhongliang, D., Memon, I. et al. Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks. Wireless Pers Commun 95, 505–521 (2017). https://doi.org/10.1007/s11277-016-3906-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3906-4

Keywords

Navigation