Skip to main content
Log in

Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Memon, I., Arain, Q. A., Memon, M. H., et al. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30(16), 3312.

    Article  Google Scholar 

  2. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.

    Article  Google Scholar 

  3. Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless personal communications, 79, 647–660.

    Article  Google Scholar 

  4. Memon, I. (2015a). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.

    Article  Google Scholar 

  5. Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 1–34.

    Google Scholar 

  6. Das, A. K. (2015). A secure and effective biometric based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems, 30(1), e2993.

    Google Scholar 

  7. Memon, I., & Memon, H. (2017). An effective and secure user authenticated protocol for location based services in road networks. arXiv preprint arXiv:1706.02646.

  8. Memon, I. (2018). Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems, 31(11), e3704.

    Article  Google Scholar 

  9. Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95(4), 3713–3732.

    Article  Google Scholar 

  10. Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and communication networks, 6, 777–789.

    Article  Google Scholar 

  11. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80, 1347–1362.

    Article  Google Scholar 

  12. Arain, Q. A., Zhongliang, D., Memon, I., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–522.

    Article  Google Scholar 

  13. Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking, 22, 391–404.

    Article  Google Scholar 

  14. Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.

    Article  Google Scholar 

  15. Talipov, E., Shin, H., Han, S., & Cha, H. (2011). A lightweight stateful address autoconfiguration for 6LoWPAN. Wireless Networks, 17, 183–197.

    Article  Google Scholar 

  16. Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 11(1), 1–22.

    Article  Google Scholar 

  17. Mishra, D., Chaturvedi, A., & Mukhopadhyay, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.

    Article  Google Scholar 

  18. Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure IPv6 address configuration protocol for vehicular networks. Wireless personal communications, 79, 721–744.

    Article  Google Scholar 

  19. X. Wu, K. N. Brown, C. J. Sreenan, P. Alvarez, M. Ruffini, N. Marchetti, et al., "An XG-PON module for the NS-3 network simulator," in Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013, pp. 195–202.

  20. Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless personal communications, 74, 731–755.

    Article  Google Scholar 

  21. Chen, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63, 407–426.

    Article  Google Scholar 

  22. Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications, 77, 197–224.

    Article  Google Scholar 

  23. Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation in VANET. Wireless personal communications, 72, 315–341.

    Article  Google Scholar 

  24. Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.

    Article  Google Scholar 

  25. Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.

    Article  Google Scholar 

  26. https://sourceforge.net/projects/Mobisim/

  27. Dai, W. Crypto?? 5.6. 0 benchmarks. https://www.cryptopp.com/benchmarks.html.

  28. Miracl benchmarks. www.shamus.ie/index.php.

  29. OpenSSL: The open source toolkit for SSL/TLS [Online]. Available:https://www.openssl.org/

  30. Cygwin: Linux Environment emulator for windows. https://www.cygwin.com/.

  31. Yan, Y., Zhang, B., Zheng, J., & Ma, J. (2010). CORE: A coding-aware opportunistic routing mechanism for wireless mesh networks [Accepted from Open Call]. IEEE Wireless Communications, 17(3), 96–103.

    Article  Google Scholar 

  32. J. Manssour, A. Osseiran and S. B. Slimane, (2009). Opportunistic relay selection for wireless networkcoding, Communications (MICC), IEEE 9th Malaysia International Conference on, Kuala Lumpur, pp.102–106

  33. Zhang, J., Chen, Y. P., & Marsic, I. (2010). MAC-layer proactive mixing for network coding inmulti-hop wireless networks. Computer Networks, 54(2), 196–207.

    Article  Google Scholar 

Download references

Acknowledgements

We thank reviewers for their valuable comments/suggestions on the early version of the paper

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Imran Memon or Hina Memon.

Ethics declarations

Conflict of interest

The author declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memon, I., Memon, H. & Arain, Q.A. Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks. Wireless Pers Commun 116, 3309–3329 (2021). https://doi.org/10.1007/s11277-020-07854-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07854-6

Keywords

Navigation