2018
DOI: 10.1002/cpe.4719
|View full text |Cite
|
Sign up to set email alerts
|

RIN: A dynamic pseudonym change system for privacy in VANET

Abstract: Summary We propose in this paper a security protocol based on a dynamic change of pseudonym for privacy and anonymity in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is the transmitter or receiver of the message. By handling all possible cases of changes in vehicles behavior during traffic, we ensure a safe and secure traffic management. We built the architecture of our solution on three essential entities designed for VANET: a trusted authority, a R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…• Privacy: A safety-aware location privacy-preserving scheme was proposed to adjust the vehicle's communication area to prevent continuous location monitoring [52]. A security protocol according to a pseudonym dynamic change for anonymity and privacy to ensure privacy for the driver and his/her vehicle whether he/she is the sender or receiver of the message [53]. A set enhancement of schemes to allow vehicles to adjust their beacon communication area to conditionally avert tracking [54].…”
Section: Requirementsmentioning
confidence: 99%
“…• Privacy: A safety-aware location privacy-preserving scheme was proposed to adjust the vehicle's communication area to prevent continuous location monitoring [52]. A security protocol according to a pseudonym dynamic change for anonymity and privacy to ensure privacy for the driver and his/her vehicle whether he/she is the sender or receiver of the message [53]. A set enhancement of schemes to allow vehicles to adjust their beacon communication area to conditionally avert tracking [54].…”
Section: Requirementsmentioning
confidence: 99%
“…This technique has higher protection against linking attacks, and more schemes need to be added for increasing confusion for an adversary. In [19], the technique uses three types of pseudonyms including real, initial and new pseudonyms produced by the TA, RSU and onboard unit (OBU), correspondingly. Each pseudonym is allocated to vehicles before the authentication of the previous one.…”
Section: Mix-context-based Schemesmentioning
confidence: 99%
“…Bouksani and Bensaber propose a security protocol based on a dynamic change of pseudonym for privacy and anonymity in Vehicular Ad hoc NETworks (VANET) that ensures privacy for the driver and his vehicle in any environment (highway or urban) and under different conditions (traffic density, independently of neighboring vehicles, and changes in vehicles behavior). The proposed solution is also able to comply with Denial Of Service (DOS) and Sybil attacks.…”
Section: Main Topics and Papers At A Glancementioning
confidence: 99%
“…The list of the papers of the special issue is provided . At this point, we want to thank all the people involved in the effort of producing this issue, starting from the submitting authors, to the team of enthusiastic reviewers who have provided useful suggestions to authors.…”
Section: Conclusion and Acknowledgmentsmentioning
confidence: 99%