Abstract:It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which is concerned with preventing an attacker from tracking a specific vehicle. In this paper, we propose a novel location privacy preservation scheme for VANETs using random encryption periods (REP). REP is based on a privacy preserving group communication protocol, which has a conditional full statelessness property. In addition, REP en… Show more
“…They introduce complementary security mechanisms that can meet the security requirements of location privacy. The proposed privacy scheme is based on random encryption period (REP) [81]. This approach relies on a security threshold scheme and a probabilistic key distribution.…”
Section: B Privacy-preserving Authentication Schemes That Address Lomentioning
confidence: 99%
“…The authentication schemes [79], [87], [81] that provide location privacy pay more attention to optimising the communication cost. These schemes focus on the authentication of messages in a timely manner.…”
Abstract-Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location. In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks. Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks. The different approaches proposed in literature are compared and open research areas are identified.
“…They introduce complementary security mechanisms that can meet the security requirements of location privacy. The proposed privacy scheme is based on random encryption period (REP) [81]. This approach relies on a security threshold scheme and a probabilistic key distribution.…”
Section: B Privacy-preserving Authentication Schemes That Address Lomentioning
confidence: 99%
“…The authentication schemes [79], [87], [81] that provide location privacy pay more attention to optimising the communication cost. These schemes focus on the authentication of messages in a timely manner.…”
Abstract-Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location. In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks. Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks. The different approaches proposed in literature are compared and open research areas are identified.
“…Instead of restricting the CMIX zone at the road intersection, Ying et al (2013) proposed dynamic mix-zone For location privacy in vehicular networks (DMLP) to dynamically create a CMIX zone i.e., the vehicle establishes a CMIX zone where and when it is needed. Similarly, Wasef and Shen (2010) suggested random encryption periods (REPs). When the vehicle decides to change its pseudonym, it sends a request to its neighbours for starting a REP. During a REP, the safety messages are encrypted using a shared group key.…”
The development of an effective pseudonym changing strategy to protect the location privacy of the vehicular adhoc network's (VANET's) users is still an open problem in the literature. In this paper, we first propose a comparison between the existing pseudonym changing strategies. This comparison is based on their effectiveness to prevent the pseudonyms linking attacks and based on the costs involved in changing a pseudonym. We also propose a new pseudonym changing strategy adapted for the urban environment, called urban pseudonym changing strategy (UPCS). UPCS is based on the construction of silent mix zones (SMs) at signalised intersections. UPCS can be configured to use either pseudonyms changing technique or pseudonyms exchanging technique inside these SMs. The analyses show a good level of prevention against the pseudonyms linking attacks. The performances are evaluated in various vehicular scenarios. The obtained results show high levels of location privacy protection can be achieved using UPCS with pseudonyms changing configuration.
“…Hence, devising security, privacy and anonymity protection mechanisms for P2P systems poses challenges for researchers and software engineers. According to Balfe et al [Balfe et al, 2004] and Wasef and Shen [Wasef and Shen, 2009], the main challenge in creating P2P systems stems from the perceived need of providing anonymity for users of the system and the growing need of offering robust access control, confidentiality and data integrity. Illegitimate attacks in which malevolent parties may assume multiple identities undermine the efficiency of P2P systems, and characterize a fundamental security threat [Piscitello, 2002].…”
Section: In3 Working Paper Series In3 (Uoc)mentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.