Abstract
In vehicular ad hoc networks (VANETs), reliable transmission and privacy of vehicles are two important issues. When vehicles are in the fast-moving environment, this paper proposes a Dynamic ID scheme which can protect the privacy of vehicles’ identity. In this paper, we divide the message transferring model into the uploading process and the downloading process. The uploading process has four stages, including the Connection establishment, the game, the detecting process and the messages sending process. In the four stages, this paper uses the Dynamic ID scheme, realizing the identity privacy. In the communication of ensuring the privacy, this paper builds a game model which is based on the reliability and the frequency of contacts, accomplishing the reliable transmission. Finally, the results of the simulation demonstrate that the presented method, the Identity Privacy-based Reliable Routing method (IPRR), cannot only increase the delivery ratio, but also reduce the end to end delay and the overhead ratio of the Network.
References
Zhang C, Lin X, Lu R, Ho P-H (2008) RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. The IEEE International Conference on Computer Communications, pp 1451–1457
Dedicated Short Range Communications (DSRC), [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html
Zhang L, Wu Q, Solanas A, Domingo-Ferrer J (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, pp 1606–1617
Sun X, Lin X, Ho P-H (2007) Secure vehicular communications based on group signature and ID-based signature scheme. The IEEE International Conference on Computer Communications, pp 1539–1545
Lee S, Pan G, Park J, Gerla M, Lu S (2007) Secure incentives for commercial ad dissemination in vehicular networks. In Processings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’07), Montreal, Canada
Yan G, Olariu S (2009) An efficient geographic location-based security mechanism for vehicular adhoc networks. IEEE 6th International Conference on Mobile Ad hoc and Sensor Systems(MASS), pp 804–809
Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, pp 1227–1239
Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. INFOCOM 2008:1229–1237
Schoch E, Kargl F, Weber M, Leinmuller T (2008) Communication patterns in VANETs. Communications Magazine, IEEE, pp 119–125
Hubaux JP, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv Mag 2(3):49–55
Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68
Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Tech 56(6):3442–3456
Zhang C, Lu R, Lin X, Ho P-H, Shen X (2008) An efficient identity based batch verification scheme for vehicular sensor networks. IEEE International Conference on Computer Communications (INFOCOM’08), Phoenix
Park K-J, Hou J, Basar T, Kim H (2009) Noncooperative carrier sense game in wireless networks. IEEE Transactions on Wireless Communications, pp 5280–5289
Poongothai T, Jayarajan K (2008) A noncooperative game approach for intrusion detection in Mobile Adhoc networks. International Conference on Computing, Communication and Networking, pp 1–4
Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, INFOCOM, pp 2147–2155
Lin X, Sun X, Wang X, Zhang C, Ho P-H, Shen X (2008) TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wireless Comm 7(12):4987–4998
Bennis M, Lara J, Tolli A (2008) Non-cooperative operators in a game-theoretic framework. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp 1–5
Pavlidou F-N, Koltsidas G (2008) Game theory for routing modeling in communication networks—a survey. J Commun Netw 10(3)
Naserian M, Tepe K (2009) Game theoretic approach in routing protocol for wireless ad hoc networks. M. Naserian, K. Tepe/Ad Hoc Networks 7 (2009) 569–578
Altman E, El Azouzi R, Abramov V (2002) Non-cooperative routing in loss networks. In: Altman E et al. Performance Evaluation 49:257–272
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theor 22(5):644–654
Hwu J-S, Chen R-J, Lin Y-B (2006) An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Trans Wireless Comm 5(9):2586–2593
Zhu H, Chang S, Li M, Naik K, Shen S (2011) Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. INFOCOM, pp 2192–2200
Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings of IEEE INFOCOM
Keranen A, Ott J (2007) Increasing reality for DTN protocol simulations. Technical Report, Helsinki University of Technology, Networking Laboratory (July 2007)
ONE simulator. http://www.netlab.tkk.fi/tutkimus/dtn/theone/
Ackowledgments
This work is supported by the Open Research Fund from the Key Laboratory for Computer Network and Information Integration (Southeast University, Ministry of Education, China), the Fundamental Research Funds for the Central Universities, the Program of National Natural Science of China (Grant No. 60933011 and 61073014), the State Key Development Program for Basic Research of China (Grant No. 2011CB302902),Natural Science Foundation of Jiangsu Province (No.BK2010414).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, D., Wang, X., Sun, L. et al. Identity privacy-based reliable routing method in VANETs. Peer-to-Peer Netw. Appl. 7, 285–294 (2014). https://doi.org/10.1007/s12083-012-0143-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-012-0143-9