Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change

01/31/2018
by   Belal Amro, et al.
0

Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with road side units, these pseudonyms are used to authenticate these vehicles and to hide real identities behind these pseudonyms, to better enhance privacy, these pseudonyms are changed frequently so that it will not be that easy to link these pseudonyms together and hence reveal real identities. However, changing pseudonyms will not be that useful if previous and current pseudonyms are easily linked together. Therefore different techniques have been proposed to hide the pseudonym changes and make it difficult to link pseudonyms together. Most of these techniques do not fully quarantine privacy when changing a pseudonym under some situations such as low traffic. In this paper, we provide a technique for changing pseudonyms that has the same privacy level under all traffic conditions. The technique relies on fixed mix zones that are planted and distributed over the roads. By this technique, a vehicle guarantees a high level of security when changing its pseudonym at that mix zone which will make it very difficult for an adversary to link particular pseudonyms together and hence reveal real identity. Performance analysis showed that our model works efficiently with very few computational costs

READ FULL TEXT

page 4

page 5

research
05/09/2019

Detecting Sybil Attacks in Vehicular Ad Hoc Networks

Ad hoc networks is vulnerable to numerous number of attacks due to its i...
research
07/17/2018

BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs

The public key infrastructure (PKI) based authentication protocol provid...
research
09/22/2019

Secured Traffic Monitoring in VANET

Vehicular Ad hoc Networks (VANETs) facilitate vehicles to wirelessly com...
research
11/08/2018

A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs

Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can imp...
research
03/04/2019

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures

In this study, we attempt to add to the literature of Connected and Auto...
research
01/06/2023

Watching your call: Breaking VoLTE Privacy in LTE/5G Networks

Voice over LTE (VoLTE) and Voice over NR (VoNR) are two similar technolo...
research
03/12/2018

A Privacy Scheme for Monitoring Devices in the Internet of Things

Sufficiently strong security and privacy mechanisms are prerequisite to ...

Please sign up or login with your details

Forgot password? Click here to reset