2011
DOI: 10.1007/978-3-642-24669-2_8
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Privacy Problems and Solutions for VANET Based on Network Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In [13], by converting trajectories into location points, a virtual trajectory generation algorithm was proposed to protect vehicles' privacy. In [14], the works related to identity and location privacy threatening factors, problems, and solutions were studied. The research indicated most of the solutions use pseudonym identity or address changing scheme to protect identity privacy.…”
Section: Spatial Cloaking Location Privacy Protectionmentioning
confidence: 99%
“…In [13], by converting trajectories into location points, a virtual trajectory generation algorithm was proposed to protect vehicles' privacy. In [14], the works related to identity and location privacy threatening factors, problems, and solutions were studied. The research indicated most of the solutions use pseudonym identity or address changing scheme to protect identity privacy.…”
Section: Spatial Cloaking Location Privacy Protectionmentioning
confidence: 99%
“…The first goal creates issues for neighborhood-based mechanisms, like cooperative collision warning. Indeed, changing pseudonyms requires to flush the communication stack to change identifiers on all layers, and to avoid sending messages with inconsistent sets of identifiers [172]. Therefore, messages may get lost and routing tables will have inconsistent entries as a result of pseudonym changes [101].…”
Section: A Considering Pseudonym Impact On Communication Stack and Se...mentioning
confidence: 99%