2017
DOI: 10.1002/dac.3437
|View full text |Cite
|
Sign up to set email alerts
|

Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks

Abstract: SummaryIn road network, vehicles' location may be identified, and their transmissions may even tracked by eavesdrops (eg, safety messages) that contain sensitive personal information such as identity and location of the vehicle. This type of communication leads to breaking the users' trajectory privacy. Frequently changing pseudonyms are widely accepted as a solution that protects the trajectory privacy of users in road networks. However, this solution may become invalid if a vehicle changes its pseudonym at a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 74 publications
(39 citation statements)
references
References 45 publications
0
39
0
Order By: Relevance
“…15,16,18,19,21,43 If RS make a decision immediately, they might lose important messages that would have helped them to make a better decision; moreover, if RS delay decision making, they might receive some incorrect event messages. [14][15][16][17] To overcome the problems mentioned above, by cross-checking the plausibility of these two types of messages, a vehicle can distinguish which event message is more trustworthy than others. On fast-forward malicious message and collusion attacks, we propose a mix zone and dynamic pseudonyms trust management scheme called MADPTM.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…15,16,18,19,21,43 If RS make a decision immediately, they might lose important messages that would have helped them to make a better decision; moreover, if RS delay decision making, they might receive some incorrect event messages. [14][15][16][17] To overcome the problems mentioned above, by cross-checking the plausibility of these two types of messages, a vehicle can distinguish which event message is more trustworthy than others. On fast-forward malicious message and collusion attacks, we propose a mix zone and dynamic pseudonyms trust management scheme called MADPTM.…”
Section: Discussionmentioning
confidence: 99%
“…Change pseudonym: w=0x1P{}NUV=wP{}NVQ=x1wPVwPqx1w. Equation denotes probability of all X‐1 neighbors also changing their pseudonyms with the target to target vehicle when V w and Q x − 1 − w satisfy Equation condition: normalP{}||At=normalx=w=0x1P{}NUV=wP{}NVQ=x1w lpgj=diupm+1()di=italicupmupm+1dj Finally, PCS strategy is feasible in practice as follows: The distance between two vehicles F i and F i − 1 which have been represented by YiL. Variables such as Y1L,Y2L,Y3L.YiL are identically distributed and independent; also probability density function is f ( x ) = λ e − λ x . The Li is left vehicle, and the target T vehicle distance between has been denoted by SiL.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Road network of mobile vehicle composes by an enormous number of vehicles that can be deployed in the designing area over the road network and the nodes self‐organized form a wireless communication network system by the way of a single or multihop . The vehicle system is broadly applied over the road network to design the physical environment vehicle monitoring data that especially work in severe and distinct environment, which people are difficult to get close to gather …”
Section: Introductionmentioning
confidence: 99%
“…In 2017, Memon et al proposed the location privacy protection for mapping services. In the same year, Memon et al also proposed pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. In 2017, Li et al proposed an anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.…”
Section: Introductionmentioning
confidence: 99%