Proceedings of the 8th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2015
DOI: 10.1145/2766498.2766500
|View full text |Cite
|
Sign up to set email alerts
|

Caps

Abstract: Preserving location privacy in vehicular ad hoc networks (VANET) is an important requirement for public acceptance of this emerging technology. Many privacy schemes concern changing pseudonyms periodically to avoid linking messages. However, the spatiotemporal information contained in beacons makes vehicles traceable and the driver's privacy breached. Therefore, the pseudonym change should be performed in a mix-context to discontinue the spatial and temporal correlation of subsequent beacons. Such mixcontext i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…A context-aware location privacy scheme based on a silent period is introduced in Ref. [ 26 ], which allows vehicles entering a silent period to change their pseudonym adaptively using context information such as finding silent neighboring vehicles. Another location unlinkability mechanism is presented in Ref.…”
Section: Related Workmentioning
confidence: 99%
“…A context-aware location privacy scheme based on a silent period is introduced in Ref. [ 26 ], which allows vehicles entering a silent period to change their pseudonym adaptively using context information such as finding silent neighboring vehicles. Another location unlinkability mechanism is presented in Ref.…”
Section: Related Workmentioning
confidence: 99%
“…The vehicle will change pseudonyms in silent mode to meet a certain traffic threshold; otherwise, it will wait for another cooperative silent period. A context-based scheme is introduced in [17] in which the vehicle entry and exit from a silent period is based on the number of neighboring vehicles and pseudonyms are changed cooperatively. Similarly, in [18], the vehicle waits for at least k silent neighbors before changing the pseudonym.…”
Section: Related Workmentioning
confidence: 99%
“…In Equation ( 18), the GH will prohibit a vehicle joining if it has invalid certificates or other credentials. If it has a valid certificate, the vehicle is allowed to join the group, as shown in Equation (17). In Equation ( 19) on joining the group, the GH will provide Group Identity (GID) to the vehicles.…”
Section: R(registration) R(registration) R(registrationmentioning
confidence: 99%
See 1 more Smart Citation
“…Forfastreactionandlessdelay,BSMcontentisnotencryptedandsentatleastonce persecondwitharadiusofabout300meters (Corseretal.,2016).Thus,anyentity havingadedicatedeavesdroppingstationwouldhaveaccesstothedriver'slocation andthiswillbeexploitednexttogenerateuserprofiles (Wiedersheimetal.,2010) whichhasanegativeimpactontheIoVusers'locationprivacy.Oneofthesolutions istousepseudonymsinsteadofrealidentitieswhilebroadcastingtheseBSMsand furthermore,makingthemtemporalandchangeableovertime (Emaraetal.,2016). Also, a cross-layer identifier (like MAC and IP) change is needed (Schoch et al, 2006).However,ifthepseudonymchangewasnotdoneinanappropriatetimeand/ orspace,acorrelationattackmaybeperformedbytheadversarytolinkthenewand theoldpseudonym.Theaforementionedissuehadmotivatedtheresearchcommunity to investigate the problem and develop a lot of robust schemes like (Beresford & Stajano,2003;Sampigethayaetal.,2005;Huangetal.,2005;Freudigeretal.,2007;Butty´anetal.,2009;Eckhoffetal.,2011;Tomandletal.,2012;Luetal.,2012;Emara et al, 2015;Ullah et al, 2017;)(areshowninmoredetailsinSection2)towell-protecttheuser'slocationand identityprivacy.…”
Section: Location Privacy Problemmentioning
confidence: 99%