Skip to main content
Log in

TAPCS: Traffic-aware pseudonym changing strategy for VANETs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Location privacy is one of the main challenges in Vehicular Ad-hoc Networks (VANETs), since weak protection may hinder the public acceptance of this technology. Frequently changing pseudonyms are commonly accepted as a solution to protect the location privacy in VANETs. However, a simple pseudonym change is not enough to provide the required protection. Although many pseudonym changing strategies have been proposed to enhance the location privacy protection provided by this approach, the development of an effective strategy is not yet achieved. In this paper, we propose a new pseudonym changing strategy called Traffic-Aware Pseudonym Changing Strategy (TAPCS). The aim of this strategy is to provide an effective location privacy protection against the different types of pseudonyms linking attacks that can be performed by a strong passive adversary model. TAPCS is a distributed pseudonym changing strategy and is one of the strategies that use the radio silence technique. Unlike the existing distributed pseudonym changing strategies that use this technique, TAPCS aims to provide a high level of location privacy protection without impacting the safety in the VANETs. The analytical evaluation and simulation results demonstrate the effectiveness of the proposed strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. 1 http://www.omnetpp.org

References

  1. Boualouache A, Moussaoui S (2014) S2si: A practical pseudonym changing strategy for location privacy in vanets. In: 2014 International conference on advanced networking distributed systems and applications (INDS). IEEE, pp 70–75

  2. Boualouache A, Moussaoui S (2015) Urban pseudonym changing strategy for location privacy in vanets. Int J Ad Hoc Ubiquit Comput (in the press)

  3. Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: Proceedings of the 4th European conference on security and privacy in ad-hoc and sensor networks, ESAS’07. Springer-Verlag, Berlin, Heidelberg, pp 129–141

  4. Buttyan L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: Proceedings of the IEEE vehicular networking conference (VNC). Tokyo, Japan. IEEE, Los Alamitos

  5. Collins K, Muntean G (2008) Route-based vehicular traffic management for wireless access in vehicular environments. In: Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, pp 1–5

  6. Daz C (2005) Anonymity metrics revisited. In: Anonymous communication and its applications, 09.10. - 14.10.2005, Dagstuhl seminar proceedings, vol 05411

  7. Eckhoff D, German R, Sommer C, Dressler F, Gansen T (2011) Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Commun Mag 49(11):126– 133

    Article  Google Scholar 

  8. Eckhoff D, Sommer C, Gansen T, German R, Dressler F (2010) Strong and affordable location privacy in vanets: Identity diffusion using time-slots and swapping. In: Vehicular networking conference (VNC), 2010 IEEE, pp174–181

  9. Emara K, Woerndl W, Schlichter JH (2013) Vehicle tracking using vehicular network beacons. In: IEEE 14th International symposium on a world of wireless, mobile and multimedia networks, WoWMoM 2013, Madrid, Spain, pp 1–6. IEEE

  10. Freudiger J, Raya M, Felegyhazi M, Papadimitratos P, Hubaux J (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)

  11. Gerlach M, Gttler F (2007) Privacy in vanets using changing pseudonyms - ideal and real. In: VTC Spring. IEEE, pp 2521–2525

  12. Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: Wireless communications and networking conference, 2005 IEEE, vol 2, pp 1187–1192

  13. IEEE (2013) Ieee standard for wireless access in vehicular environments security services for applications and management messages. IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006), pp 1–289

  14. Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T (2011) Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. Commun Surveys Tutor IEEE 13(4):584–616

    Article  Google Scholar 

  15. Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo simulation of urban mobility. Int J Adv Syst Measur 5(3):128–138

    Google Scholar 

  16. Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: Robust location privacy scheme for vanet. IEEE J Selected Areas Commun 1589

  17. Lefevre S, Petit J, Bajcsy R, Laugier C, Kargl F (2013) Impact of v2x privacy strategies on intersection collision avoidance systems. In: Vehicular networking conference (VNC), 2013 IEEE, pp 71–78

  18. Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in vanets. In: 2009 10th International symposium on pervasive systems, algorithms, and networks (ISPAN), pp 648–652. IEEE

  19. Lu R, Lin X, Luan T, Liang X, Shen X (2012) Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE T Veh Technol 86–96

  20. Marfia G, Roccetti M (2011) Vehicular congestion detection and short-term forecasting: A new model with results. IEEE Trans Veh Technol 60(7):2936–2948

    Article  Google Scholar 

  21. Milojevic M, Rakocevic V (2014) Distributed road traffic congestion quantification using cooperative vanets. In: 2014 13th Annual mediterranean ad hoc networking workshop (MED-HOC-NET). IEEE, pp 203–210

  22. NHTSTA Preliminary statement of policy concerning automated vehicles (2013). Technical report, the U.S National Highway Traffic Safety Administration (NHTSTA)

  23. Petit J, Schaub F, Feiri M, Kargl F (2014) Pseudonym schemes in vehicular networks: A survey. Commun Surveys Tutor IEEE PP(99):1–32

    Google Scholar 

  24. Rybicki J, Scheuermann B, Kiess W, Lochert C, Fallahi P, Mauve M (2007) Challenge: Peers on wheels-a road to new traffic information systems. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pp 215–221. ACM

  25. Sadiku MN, Musa S (2013) Performance analysis of computer networks. Springer

  26. Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) Caravan: Providing location privacy for vanet. In: In embedded security in cars (ESCAR)

  27. Sommer C, German R, Dressler F (2011) Bidirectionally coupled network and road traffic simulation for improved ivc analysis. IEEE Trans Mobile Comput 10(1):3–15

    Article  Google Scholar 

  28. Sommer C, Schmidt A, Chen Y, German R, Koch W, Dressler F (2010) On the feasibility of umts-based traffic information systems. Ad Hoc Netw 8(5):506–517

    Article  Google Scholar 

  29. Song JH, Wong V, Leung V (2009) Wireless location privacy protection in vehicular ad-hoc networks. In: IEEE International conference on communications, 2009. ICC ’09., pp 1–6

  30. Song JH, Wong V, Leung V (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mobile Netw Appl 15(1):160–171

    Article  Google Scholar 

  31. Wang C, Tsai HM (2013) Detecting urban traffic congestion with single vehicle. In: 2013 International conference on connected vehicles and expo (ICCVE). IEEE, pp 233–240

  32. Wasef A, Shen X (2010) Rep: Location privacy for vanets using random encryption periods. Mobile Netw Appl 15(1):172– 185

    Article  Google Scholar 

  33. Wiedersheim B, Ma Z, Kargl F, Papadimitratos P (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: Proceedings of the 7th international conference on Wireless on-demand network systems and services, WONS’10. IEEE Press, Piscataway, pp 176– 183

  34. Wischoff L, Ebner A, Rohling H, Lott M, Halfmann R (2003) Sotis-a self-organizing traffic information system. In: Vehicular technology conference, 2003. VTC 2003-Spring. The 57th IEEE semiannual, vol 4. IEEE, pp 2442–2446

  35. Ying B, Makrakis D, Mouftah H (2013) Dynamic mix-zone for location privacy in vehicular networks. Commun Lett IEEE 17(8):1524–1527

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelwahab Boualouache.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Boualouache, A., Moussaoui, S. TAPCS: Traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw. Appl. 10, 1008–1020 (2017). https://doi.org/10.1007/s12083-016-0461-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0461-4

Keywords

Navigation