2021
DOI: 10.3390/su132212513
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Mix-Context-Based Method for Location Privacy in Road Networks

Abstract: Preserving location privacy is increasingly an essential concern in Vehicular Adhoc Networks (VANETs). Vehicles broadcast beacon messages in an open form that contains information including vehicle identity, speed, location, and other headings. An adversary may track the various locations visited by a vehicle using sensitive information transmitted in beacons such as vehicle identity and location. By matching the vehicle identity used in beacon messages at various locations, an adversary learns the location hi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…High-level Petri nets (HLPNs) are used for two reasons [ 4 ]: to simulate the proposed scheme and present mathematical modeling to analyze the structure properties and behavior of the scheme. The benefits are that it can verify the interconnection of system components and processes, information flow, and processing.…”
Section: Formal Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…High-level Petri nets (HLPNs) are used for two reasons [ 4 ]: to simulate the proposed scheme and present mathematical modeling to analyze the structure properties and behavior of the scheme. The benefits are that it can verify the interconnection of system components and processes, information flow, and processing.…”
Section: Formal Modelingmentioning
confidence: 99%
“…[ 3 ]. Dedicated short-range communication (DSRC), cellular networks, WiMax, WiFi, and VeMac are the wireless communication technologies utilized in VANETs [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…When traffic is lower, two pseudonyms are generated and exchanged randomly with each other. The neighbors accept the correct pseudonym and the false one is excluded [22]. The benefit of this technique is that the adversary cannot trace the target vehicle for a long time successfully.…”
Section: Mix-context-based Schemesmentioning
confidence: 99%