Skip to main content
Log in

Identity privacy-based reliable routing method in VANETs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In vehicular ad hoc networks (VANETs), reliable transmission and privacy of vehicles are two important issues. When vehicles are in the fast-moving environment, this paper proposes a Dynamic ID scheme which can protect the privacy of vehicles’ identity. In this paper, we divide the message transferring model into the uploading process and the downloading process. The uploading process has four stages, including the Connection establishment, the game, the detecting process and the messages sending process. In the four stages, this paper uses the Dynamic ID scheme, realizing the identity privacy. In the communication of ensuring the privacy, this paper builds a game model which is based on the reliability and the frequency of contacts, accomplishing the reliable transmission. Finally, the results of the simulation demonstrate that the presented method, the Identity Privacy-based Reliable Routing method (IPRR), cannot only increase the delivery ratio, but also reduce the end to end delay and the overhead ratio of the Network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

References

  1. Zhang C, Lin X, Lu R, Ho P-H (2008) RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. The IEEE International Conference on Computer Communications, pp 1451–1457

  2. Dedicated Short Range Communications (DSRC), [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html

  3. Zhang L, Wu Q, Solanas A, Domingo-Ferrer J (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, pp 1606–1617

  4. Sun X, Lin X, Ho P-H (2007) Secure vehicular communications based on group signature and ID-based signature scheme. The IEEE International Conference on Computer Communications, pp 1539–1545

  5. Lee S, Pan G, Park J, Gerla M, Lu S (2007) Secure incentives for commercial ad dissemination in vehicular networks. In Processings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’07), Montreal, Canada

  6. Yan G, Olariu S (2009) An efficient geographic location-based security mechanism for vehicular adhoc networks. IEEE 6th International Conference on Mobile Ad hoc and Sensor Systems(MASS), pp 804–809

  7. Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, pp 1227–1239

  8. Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. INFOCOM 2008:1229–1237

    Google Scholar 

  9. Schoch E, Kargl F, Weber M, Leinmuller T (2008) Communication patterns in VANETs. Communications Magazine, IEEE, pp 119–125

  10. Hubaux JP, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv Mag 2(3):49–55

    Article  Google Scholar 

  11. Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Google Scholar 

  12. Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Tech 56(6):3442–3456

    Article  Google Scholar 

  13. Zhang C, Lu R, Lin X, Ho P-H, Shen X (2008) An efficient identity based batch verification scheme for vehicular sensor networks. IEEE International Conference on Computer Communications (INFOCOM’08), Phoenix

    Google Scholar 

  14. Park K-J, Hou J, Basar T, Kim H (2009) Noncooperative carrier sense game in wireless networks. IEEE Transactions on Wireless Communications, pp 5280–5289

  15. Poongothai T, Jayarajan K (2008) A noncooperative game approach for intrusion detection in Mobile Adhoc networks. International Conference on Computing, Communication and Networking, pp 1–4

  16. Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, INFOCOM, pp 2147–2155

  17. Lin X, Sun X, Wang X, Zhang C, Ho P-H, Shen X (2008) TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wireless Comm 7(12):4987–4998

    Article  Google Scholar 

  18. Bennis M, Lara J, Tolli A (2008) Non-cooperative operators in a game-theoretic framework. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp 1–5

  19. Pavlidou F-N, Koltsidas G (2008) Game theory for routing modeling in communication networks—a survey. J Commun Netw 10(3)

  20. Naserian M, Tepe K (2009) Game theoretic approach in routing protocol for wireless ad hoc networks. M. Naserian, K. Tepe/Ad Hoc Networks 7 (2009) 569–578

  21. Altman E, El Azouzi R, Abramov V (2002) Non-cooperative routing in loss networks. In: Altman E et al. Performance Evaluation 49:257–272

  22. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theor 22(5):644–654

    Article  MATH  MathSciNet  Google Scholar 

  23. Hwu J-S, Chen R-J, Lin Y-B (2006) An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Trans Wireless Comm 5(9):2586–2593

    Article  Google Scholar 

  24. Zhu H, Chang S, Li M, Naik K, Shen S (2011) Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. INFOCOM, pp 2192–2200

  25. Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings of IEEE INFOCOM

  26. Keranen A, Ott J (2007) Increasing reality for DTN protocol simulations. Technical Report, Helsinki University of Technology, Networking Laboratory (July 2007)

  27. ONE simulator. http://www.netlab.tkk.fi/tutkimus/dtn/theone/

Download references

Ackowledgments

This work is supported by the Open Research Fund from the Key Laboratory for Computer Network and Information Integration (Southeast University, Ministry of Education, China), the Fundamental Research Funds for the Central Universities, the Program of National Natural Science of China (Grant No. 60933011 and 61073014), the State Key Development Program for Basic Research of China (Grant No. 2011CB302902),Natural Science Foundation of Jiangsu Province (No.BK2010414).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojing Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, D., Wang, X., Sun, L. et al. Identity privacy-based reliable routing method in VANETs. Peer-to-Peer Netw. Appl. 7, 285–294 (2014). https://doi.org/10.1007/s12083-012-0143-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0143-9

Keywords

Navigation