Reference Hub3
A Group Leader Location Hiding Technique for VANETs

A Group Leader Location Hiding Technique for VANETs

Shaker Aljallad, Raad S. Al-Qassas, Malik Qasaimeh
Copyright: © 2017 |Volume: 8 |Issue: 3 |Pages: 14
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781522514039|DOI: 10.4018/IJDST.2017070104
Cite Article Cite Article

MLA

Aljallad, Shaker, et al. "A Group Leader Location Hiding Technique for VANETs." IJDST vol.8, no.3 2017: pp.67-80. http://doi.org/10.4018/IJDST.2017070104

APA

Aljallad, S., Al-Qassas, R. S., & Qasaimeh, M. (2017). A Group Leader Location Hiding Technique for VANETs. International Journal of Distributed Systems and Technologies (IJDST), 8(3), 67-80. http://doi.org/10.4018/IJDST.2017070104

Chicago

Aljallad, Shaker, Raad S. Al-Qassas, and Malik Qasaimeh. "A Group Leader Location Hiding Technique for VANETs," International Journal of Distributed Systems and Technologies (IJDST) 8, no.3: 67-80. http://doi.org/10.4018/IJDST.2017070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Vehicular ad hoc network (VANET) is one of the most promising and emerging communication technologies that could definitely lead to significant improvements in the traffic management and safety. Location privacy is a critical requirement in VANET, since location information may be shared between vehicles to support the VANET applications. Therefore, it is crucial to protect the location of users. In this paper, we propose a location privacy protection technique that utilises the shadow concept and takes into consideration the reliability in protecting the group leader location, which would basically provide the needed anonymity and protection for the location information targeted by global adversaries. The performance of the proposed technique has been investigated through simulation and compared against the well-known AOSA technique. The results from extensive simulations have shown that the proposed technique enhances the anonymity of the group leader vehicle by reducing the time that the global adversaries can use in collecting location information.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.