Conference PaperPDF Available

Privacy in VANETs using Changing Pseudonyms - Ideal and Real

Authors:

Abstract and Figures

Vehicular ad hoc networks (VANETs) and vehicular communications are considered a milestone in improving the safety, efficiency and convenience in transportation. Vehicular ad hoc networks and many vehicular applications rely on periodic broadcast of the vehicles' location. For example, the location of vehicles can be used for detecting and avoiding collisions or geographical routing of data to disseminate warning messages. At the same time, this information can be used to track the users' whereabouts. Protecting the location privacy of the users of VANETs is important, because lack of privacy may hinder the broad acceptance of this technology. Frequently changing pseudonyms are commonly accepted as a solution to protect the privacy in VANETs. In this paper, we discuss their effectiveness and different methods to change pseudonyms. We introduce the context mix model that can be used to describe pseudonym change algorithms. Further, we asses in which situations, i.e. mix contexts, a pseudonym change is most effective and improves the privacy in vehicular environments.
Content may be subject to copyright.
Privacy in VANETs using Changing
Pseudonyms - Ideal and Real
Matthias Gerlach and Felix G¨
uttler
{matthias.gerlach |felix.guettler}@fokus.fraunhofer.de
Abstract Vehicular ad hoc networks (VANETs) and vehicular
communications are considered a milestone in improving the
safety, efficiency and convenience in transportation.
Vehicular ad hoc networks and many vehicular applications
rely on periodic broadcast of the vehicles’ location. For example,
the location of vehicles can be used for detecting and avoiding
collisions or geographical routing of data to disseminate warning
messages. At the same time, this information can be used to
track the users’ whereabouts. Protecting the location privacy of
the users of VANETs is important, because lack of privacy may
hinder the broad acceptance of this technology.
Frequently changing pseudonyms are commonly accepted as
a solution to protect the privacy in VANETs. In this paper,
we discuss their effectiveness and different methods to change
pseudonyms. We introduce the context mix model that can be
used to describe pseudonym change algorithms. Further, we asses
in which situations, i.e. mix contexts, a pseudonym change is most
effective and improves the privacy in vehicular environments.
I. INTRODUCTION
Vehicular ad hoc networks (VANETs) and vehicular com-
munications will significantly improve the safety, efficiency
and convenience in transportation.
By means of ad hoc vehicle-to-infrastructure and vehicle-to-
vehicle communication the driver can be warned about critical
traffic situations earlier and more precise. Further, cooperative
safety applications between vehicles can be realized where
vehicles exchange position data to prevent crashes. Last not
least, convenience applications, such as point of interest no-
tification and in-car access to the Internet can cost-efficiently
be delivered by this technology. With the increasing number
of vehicles to be equipped with a vehicular communication
system this will probably result in the largest ad hoc network
ever deployed. For vehicular ad hoc networks, privacy has
been identified to be profoundly important (e.g., [1], [2], [3],
[4]). When it comes to privacy in VANETs, many authors
propose changing pseudonyms, yet do not discuss or evaluate
how these pseudonyms can be changed to provide the best
level of privacy.
In this paper, we briefly review attacks on changing
pseudonyms. Further, we propose an approach that optimizes
the use of pseudonyms while improving the overall privacy of
the system, called context mix and show its superiority over
arbitrarily changing pseudonyms by simulation.
This paper is organized as follows: in Sec. II, we discuss
related work. We then discuss how attacks on the privacy can
be carried out by linking changing pseudonyms in Sec. III.
In Sec. IV, we introduce the context mix model and criteria
for good situations to change pseudonyms. We evaluate the
proposed situations called mix contexts by means of
simulations and describe our findings in Sec. V. We conclude
this paper and point out future work in Sec. VI.
II. RELATED WORK
In [5], Golle et al. propose using self-assigned digital
pseudonyms. They further sketch three different measures to
increase anonymity with changing pseudonyms that are similar
to our mix contexts.
In [4], D¨
otzer discusses potential implications of miss-
ing privacy and proposes to use centrally assigned digital
pseudonyms. He also proposes an architecture for pseudonym
generation and registration for revocation purposes.
Huang et al. propose an approach based on dynamically
created clusters [6]. The cluster-head works as a mix and all
communication to the cluster-head is encrypted. The work
focuses on non-safety applications. The authors further ex-
amine the use of a silence period to increase the effect of a
pseudonym change. A common criticism is that clustering may
be non-trivial to achieve in the dynamic vehicular environment.
In [7], Choi et al. propose a system to balance audibility
and privacy in vehicular communications based on symmet-
ric cryptographic primitives and two types of pseudonyms,
namely long term and short term. They also propose to use
changing short term pseudonyms for privacy protection.
Location privacy for pervasive computing has been treated
in detail by Beresford in [8], [9]. He defines location privacy
as “(..) the ability to prevent others from learning one’s current
or past location” [8]. Beresford provides a detailed analytical
analysis of the effectiveness of pseudonym change in mix-
zones. The approach is suitable for applications, which only
need location information in dedicated and fixed application
zones. The zones where an application does not need (to
send) location information are called mix zones, because here,
applications can change their pseudonyms.
The variable quality approach, where a centralized location
server adjusts the accuracy of the given location such that the
given area holds enough nodes to provide anonymity has been
proposed by Gruteser in [10] and refined by Beresford in [9].
In [11], Gruteser and Huh discuss the anonymity of periodic
location samples and describe one possible attack on linking
messages based on Kalman filters.
III. ATTACKS ON PSEUDONYM CHANGES
Simply changing pseudonyms in arbitrary intervals and in
arbitrary situations i.e., contexts wastes pseudonyms (and
1550-2252/$25.00 ©2007 IEEE 2521
hence resources for storing or calculating them) as Beresford
already pointed out in [8]. E.g., for vehicular scenarios, two
vehicles are clearly distinguishable by their direction. Hence,
even if changing their pseudonym at the same time and being
near to each other, they can be identified, and the pseudonyms
are wasted.
A. Attack parameters
The actual cost of linking pseudonyms if feasible at all
depends on the available information to the attacker and the
algorithms and possible optimizations to link messages. This
in turn depends on the following parameters:
Algorithms and rules used by the attacker that can be used
for linking messages. This includes simple approaches
like matching the direction of nodes to multi target
tracking as described in [11]. This also takes into account
which knowledge an attacker uses to infer the linking.
Density and distribution of receivers. The denser the grid
of receivers is, the higher will be the probability of an
attacker overhearing a pseudonym change. In our work,
we assume a global attacker.
Beacon frequency, type, and accuracy of information sent.
A higher beacon frequency will probably make tracking
easier because a higher beacon frequency narrows the
area for matching two messages. Further, if any identify-
ing (non-volatile) data is sent in the beacons in addition
to the pseudonyms, this can be used by the attacker to
link two pseudonyms as well.
B. Potential algorithms and rules
We identify three major directions that an attacker could
follow to link pseudonyms:
Attacks based on non-volatile data, where additional data
that does not change (such as unencrypted higher layer
identifiers, or the radio fingerprint of a unit) are used to
infer a connection between two messages.
Protocol based attacks, where knowledge about the proto-
col (e.g., a vehicle always sends in a particular time-slot,
independent of its pseudonym) is used to link messages.
Attacks based on physical parameters and constraints,
where knowledge about, e.g., the estimated distance trav-
elled and the last position is used to infer the current
position, and hence to link two messages as belonging to
the same node. This attack has been described as simple
tracking by Huang et al. [6].
Attacks based on non-volatile data will probably be the
cheapest. Their effectiveness is high, if the non-volatile data
can be used to distinguish between the different nodes that
change their pseudonym in a certain area. A commonly cited
attack is the use of the radio fingerprint of the communication
system.
Different algorithms for tracking pseudonym changes have
been proposed based on physical parameters, such as finding
a maximum match in a bipartite graph using pre-established
data on the movement of nodes in a mix zone (Beresford
in [9]) or using Kalman-filter based techniques (Gruteser and
Hoh in [11]). Both techniques are based on maximizing the
probability of two pseudonyms belonging to the same node,
based on physical parameters.
Clearly, all attacks aim at finding properties of a node that
make it identifiable and recognizable. For our evaluations,
we use two rather simple attackers that will be described in
Sec. V.
IV. CONTEXT MIXES –INCREASING THE
PRIVACY IN VANETS
We propose to include the use of context information (such
as the number of neighbors, their direction and speed) for
initiating a pseudonym change. Like this, nodes cooperatively
identify good opportunities to blend in a number of vehicles
and hence increase their anonymity. Following the terms
mix-zones (Beresford) and mix-nets (Chaum) we call these
situations mix-contexts.
Stable
pseudonym
Ready to Change
checkContext()
Start
sd_Context Mix
Check Success
gatherSuccessData()
[Change successful]
[else]
Pseudonym change trigger /
getNewPseudonym(), changePseudonym()
Stable time nished
Stable time override
End of check success window /
checkSuccess()
initialize()
Fig. 1. General algorithm for pseudonym change.
Fig. 1 depicts a general state diagram of a pseudonym
change algorithm. The minimal stable time may be configured
to account for the application requirement of a stable commu-
nication session. After the stable time finishes, the node waits
for the trigger to change its pseudonym, checks if the change
has been successful and then enters the next period of stable
pseudonym to run through the process again.
After initialization, the system enters the pseudonym cycle
and waits for expiry of the stable time interval. Under certain
circumstances, a pseudonym change may be sensible before
the stable time is over; in this case the stable time is overrid-
den. The system is then ready to change its pseudonym, and in
this state permanently assesses its context (i.e., neighborhood
information) in search for a mix context that suffices the
target level of anonymity. If this mix context is eventually
found, a new pseudonym is retrieved and set. Simply put,
the target level of anonymity can be a certain number of
nodes with similar direction within a certain range. After
changing the pseudonym, the system assesses wether the
change was successful (i.e., if enough similar nodes changed
their pseudonym at the same time) or not in order to start the
whole process again, or try to change the pseudonym again,
respectively.
2522
A. Pseudonym change triggers - mix contexts
Dey defines context as “(...) any information that can be
used to characterize the situation of an entity (...) [12].Using
this definition, a mix context is defined as any situation that
provides sufficient anonymity with respect to an attacker to
change a pseudonym.
Depending on the desired level of protection, this may sim-
ply be the number of nodes in the neighborhood irrespective of
their properties, or the nodes with similar properties, such that
they would be indistinguishable for an attacker. A pseudonym
change algorithm using in mix contexts is a context mix.A
context mix provides unlinkability between pseudonyms after
a change.
A mix context shall provide sufficient anonymity to a node
changing its pseudonym. This requires that the neighborhood
of the node and the general situation must be such that the
entropy of the situation after the change is sufficiently high.
Hence, a node must permanently assess its context according
to the expected entropy if it changes its pseudonym. The
expected entropy also depends on the attacker; this implies
that every node may need to implement a reference attacker
to estimate its level of privacy.
In addition to the expected entropy, i.e., the anonymity of
the change, the potential impact of the pseudonym change
is important. Situations that allow a direct mapping of the
pseudonym to the user, for example by restricted space identi-
fication, may require a pseudonym change shortly before and
after this situation in order to limit the amount of available
information on the traces for the identified user.
Currently, we define the availability of more than Nnodes
in a defined area as mix context. In addition to simply changing
the pseudonym in the right context, we define a minimal stable
time where the node is supposed not to change its pseudonyms.
This is important in order to prevent frequently terminated
connections, and it bounds the number pseudonyms used per
node.
V. A NONYMITY SIMULATIONS
For our simulations we used JIST/SWANS [13] and the
vehicular mobility model provided with STRAW [14]. The
simulation engine is written in pure Java and runs within a
standard Java virtual machine, by embedding simulation time
semantics during execution at byte-code level. The Street Ran-
dom Waypoint (STRAW) mobility model allows to simulate
maps of large real world cites and offers advanced vehicle
behavior together with simplified traffic control mechanisms.
A. Simulation parameters
The following parameters were changed in the simulation
runs below:
traffic density,
pseudonym change algorithm, and
attacker model.
The traffic density defines how many vehicles could be found
on one kilometer street length at specific point in time.
The Forschungsgesellschaft f¨
ur Straßen und Verkehrswesen
(FGSV research agency for roads and transport) classifies
five different traffic density ranges as follows [15]:
<16 vehicles
km low traffic density
16 - 23 vehicles
km medium traffic density
24 - 31 vehicles
km high traffic density
32 - 45 vehicles
km very high traffic density
>45 vehicles
km overload
The simulation uses a map of a real urban area. It contains
different street types with assigned speed limits ranging from
11 meter per second to 19 meter per second. The total street
length is about 16 km. All segments have two directions and
at least two lanes. One way streets are currently not supported.
In line with the traffic densities defined above we simulate low
traffic density with about 6 nodes per kilometer (100 nodes on
map) and about 13 nodes per kilometer (200 nodes on map)
as well as medium traffic density with about 19 nodes per
kilometer (300 nodes on map).
The two pseudonym change algorithms simulated for
this paper are: random pseudonym change and context mix
pseudonym change. Both algorithms keep the pseudonym
stable for a minimum stable time of one minute. This value
has been chosen because it represents a reasonable value for
position based routing [16], [17].
The random algorithm changes decides if it changes its
pseudonym for every beacon it sends (except in the minimum
stable time). It can be configured with a probability threshold
that is compared with a randomly generated value every bea-
con interval. The pseudonym is changed if the random value is
below the probability threshold. As the reference algorithm to
compare with the context mix concept, we manually adjusted
the probability threshold to find the best results in several
simulation runs not described here. Arguably, this algorithm
is better than a fixed time interval for pseudonym change
since with the fixed interval a pattern exists that can easily
be followed by an attacker.
The context mix algorithm only changes pseudonym if in
the preset mix context. A mix context at best represents all
information that an attacker may use to link pseudonyms.
In our case, the mix context is limited to the information
our attackers are using and which are provided by each
vehicle. This comprises the vehicle’s last position and the
pseudonym used1. We currently do not incorporate velocity,
heading, acceleration or other helping context information
to separate vehicles in our pseudonym change and attacker
algorithms. If the node neighborhood includes Nvehicles at
a distance smaller than the minimal distance for a pseudonym
change, it changes its pseudonym. The minimal distance for
a pseudonym change is set to 4.25 meters according to an
average lane width of 3.5meters and an average position
reporting error of 0.75 meters.
We implemented two attacker models. A simple attacker
and a multi target tracking attacker, which are two different
stateless attackers. The attackers decide on the fly if they can
1In the future vehicular system, the pseudonym will comprise the MAC
and IP address of the vehicle and its certificate for network access control.
2523
trace a vehicle. Simple tracking expects the vehicle to send a
message in a fixed area around where the previous message
was sent. It fails if there are several vehicles in that region.
Multi target tracking can link the pseudonym if it detects that
only one vehicle in a set of suspects within the expected area
has changed the pseudonym. Multi-target tracking fails if the
anonymity set size is greater than one after all detectable, in-
nocent suspects are excluded. Both algorithms use information
like the maximum speed and position accuracy, which are not
included in the mix context definition because these values are
provided by the system, not by the vehicle.
The location update cycle time is the frequency of location
update broadcasts done by each vehicle in the simulation. In
this work we focus on a fixed location update rate of 1Hz.
This value has been chosen because it represents a reasonable
update rate for e.g. position based routing and simple warning
applications.
B. Simulation results
Fig. 2. Traceability of vehicles as a function of tracking time.
Fig. 2 shows the results of a simulation run with 100
vehicles sending a beacon every second under the multi target
tracking attacker. The minimum stable time was set to a
minute. The values on the y-axis represent the number of
pseudonyms that could be linked at after a certain time (T).
Simulation time was 30 minutes.
The figure shows that less vehicles could be tracked if they
change their pseudonym in mix contexts. It also shows that
a large portion of vehicles can still be tracked even though
they change their pseudonyms. We are currently exploring
this behavior in additional simulations and expect to improve
the mix context algorithm by adjusting context parameters.
In addition to the better privacy provision by the mix context
algorithm, the overall number of pseudonyms used per vehicle
is smaller, because a pseudonym is only changed when it may
really be worth it.
The figure also shows how long a multi-target tracking
attacker is able to follow a vehicles trace for both pseudonym
change algorithms. The x-axis shows the average time, in-
cluding a minimal stable time of 1minute that we used in
the simulation. The average tracking time is influenced by
the traffic density and the pseudonym change algorithm.The
following observations can be made:
1) A higher node density leads to shorter pseudonym usage
times for both algorithms.
2) The node density has no significant influence on the
performance difference between both algorithms.
3) Context mix algorithms successfully change pseudonym
roughly 2.4times faster than random pseudonym change
algorithms.
Shorter tracking times lead to better privacy. After the min-
imal stable time passed it is desirable that a node successfully
change its pseudonym as fast as possible.
Fig. 3. Average tracking time for multi-target attack.
Fig. 4. Unlinkable pseudonym changes in the first to fifth minute after expiry
of the minimal stable time with low traffic.
Fig. 3 shows that the worst case for privacy is the low traffic
scenario, for both algorithms and the different traffic densities.
The random pseudonym change algorithm is only able to reach
pseudonymity for 21% (see Fig. 4) of all vehicles in the first
minute after the minimal stable time has passed. There is also
a significantly high number of vehicles that are not able to
successfully change their pseudonym within 5 minutes. The
context mix approach performs better. 81% of vehicles can
change their pseudonym within the first 5 minutes unlinkable
to our attacker. The majority of these nodes is able to change
within the first minute.
The results for the higher density vehicle simulations are
slightly different, as depicted in Fig. 5. The context mix
approach successfully changes pseudonyms for 91% and 96%
in the first 5 minutes. Up to 78% of pseudonyms already
could be successfully changed in the first minute at high traffic
density. Under the same conditions, the random pseudonym
change algorithm just changes 37% in the first minute.
From these results we can see that mix contexts algorithms
perform well at high traffic and in comparison to random
algorithms especially in low traffic scenarios.
2524
Fig. 5. Unlinkable pseudonym changes in the first to fifth minute after expiry
of the minimal stable time with medium (top figures) and high (bottom figures)
traffic.
The reader may notice that we concentrated on the rather
lower end of traffic densities. Since VANET technology will
not have full market penetration from the first day low traffic
scenarios are interesting to measure algorithm performance.
Currently we are further investigating the influence of market
penetration (including non-VANET enabled vehicles in our
simulations) on the performance of mix contexts pseudonym
changes. Higher densities will probably yield better perfor-
mance of both algorithms.
VI. CONCLUSION AND FUTURE WORK
The simulations show an improvement in the achieved
level of privacy for this approach. Currently, more simulations
to verify and refine these results are carried out and will
be included in subsequent work. Another advantage of this
approach is the more efficient use of pseudonyms due to only
changing them when it improves the privacy. On the other
hand, a couple of issues have to be taken in mind: First,
our simulations showed that the minimum stable time affects
changing pseudonyms, because the probability to meet a node
changing its pseudonym decreases. Therefore we introduced
achange ready flag that is broadcast by a node where the
minimal stable time expired. Thus when two nodes with this
flag set meet, they the probability that they will change their
pseudonym at the same time increases. The use of this flag
will be examined in more detail in future work.
Second, if different nodes take different context information
into account, they will change their pseudonyms in different
situations. In addition, the more context information is consid-
ered, the fewer situations will occur where a node changes its
pseudonym. Thus, it may be important that pseudonym change
algorithms are the same for all nodes in the network.
Third, the parameters for the algorithms need to be refined
in order to optimize the privacy provisions. In particular,
minimum stable time will need to be adjusted to realistic values
and its impact examined.
Finally, the applicability of the algorithm in real life scenar-
ios still has to be proved. This includes estimating a sensible
minimal stable time, including data about when the vehicle is
started, and the like.
In a nutshell, mix contexts provide an improvement of the
anonymity in vehicular ad hoc networks over randomly chang-
ing the pseudonyms in certain intervals. The complexity of
the algorithm is low, as vehicles do not require explicit group
formation to change pseudonyms. Looking at the simulation
results, however, reveals that the amount of tracking that a
global passive attacker can achieve is still significant.
ACKNOWLEDGEMENTS
This work has been carried out in the ”Network on Wheels”
[18] project supported by the German Ministry for Education
and Research under Contract No. 01AK064F.
REFERENCES
[1] J.-P. Hubaux, S. ˇ
Capkun, and J. Luo, “The security and privacy
of smart vehicles,” IEEE Security and Privacy, vol. 4, no. 3, pp.
49–55, 2004. [Online]. Available: http://lcawww.epfl.ch/Publications/
luo/HubauxCL04.pdf
[2] A. Aijaz, B. Bochow, F. D ¨
otzer, A. Festag, M. Gerlach, R. Kroh, and
T. Leinm¨
uller, Attacks on inter vehicle communication systems - an
analysis,” The Network on Wheels Project, Tech. Rep., 2005, http://
www.network-on-wheels.de/documents.html.
[3] M. Gerlach, “VaneSe - An approach to VANET security,” in Proceedings
of V2VCOM 2005, O. Altintas and W. Chen, Eds., July 2005.
[4] F. D¨
otzer, “Privacy issues in vehicular ad hoc networks,” in Workshop
on Privacy Enhancing Technologies, Cavtat, Croatia, May 2005.
[5] P. Golle, D. Greene, and J. Staddon, “Detecting and correcting malicious
data in vanets, in Proceedings of the first ACM workshop on Vehicular
ad hoc networks, 2004, pp. 29–37.
[6] L. Huang, K. Sampigethaya, , K. Matsuura, R. Poovendran, K. Sezaki,
and M. L, “Caravan: Providing location privacy for VANET,” in Pro-
ceedings of Escar 2005, 2005.
[7] J. Y. Choi, M. Jakobsson, and S. Wetzel, “Balancing auditability and
privacy in vehicular networks, in Proceedings of Q2SWinet, 2005.
[8] A. R. Beresford and F. Stajano, “Location privacy in pervasive comput-
ing,” IEEE Pervasive Computing, pp. 46–55, 2003.
[9] A. R. Beresford, “Location privacy in ubiquitous computing, Disserta-
tion, University of Cambridge, 2005.
[10] M. Gruteser and D. Grunwald, “Anonymous usage of location based
services through spatial and temporal cloaking.” in Proceedings of the
ACM MobiSys, 2003.
[11] M. Gruteser and B. Hoh, “On the anonymity of periodic location sam-
ples,” in Proceedings of Conference on Security in Pervasive Computing,
2005.
[12] A. K. Dey and G. D. Abowd, “Towards a better understanding of context
and context-awareness, in Proceedings of 1st International Symposium
on Handheld and Ubiquitous Computing, 1999, pp. 304–307.
[13] R. Barr and Z. J. Haas, “Scaleable simulation of mobile ad hoc
networks,” November 2003, 3rd IRTF Ad hoc Network Scalability
Meeting.
[14] D. Choffnes and F. Bustamante, “An integrated mobility and
traffic model for vehicular wireless networks, in 2nd ACM
International Workshop on Vehicular Ad Hoc Networks, September
2005. [Online]. Available: http://www.aqualab.cs.northwestern.edu/
publications/DChoffnes05vanet.pdf
[15] Forschungsgesellschaft f¨
ur Straßen und Verkehrswesen, Handbuch f¨
ur
die Bemessung von Straßenverkehrsanlagen (HBS), January 2002.
[16] C. Lochert, H. Hartenstein, J. Tian, H. F¨
ußler, D. Hermann, and
M. Mauve, “A routing strategy for vehicular ad hoc networks in city
environments, in Intelligent Vehicles Symposium. Network Lab., NEC
Eur. Ltd., June 2003, pp. 156–161.
[17] I. Stojmenovic, Position-based routing in ad hoc networks. IEEE, July
2002, vol. 40, ch. 7, pp. 128–134.
[18] The Network on Wheels (NOW) Project, “NOW website, 2004, http:
//www.network-on-wheels.de.
2525
... The scheme updates vehicle pseudonyms when the speed drastically drops or accelerates, while maintaining the same pseudonym for nearly constant speeds. Buttyan et al. [14] proposed Slow, a pseudonym replacement method that considers driving speed as a factor affecting pseudonym replacement. When the speed falls below a specific threshold, the vehicle stops sending messages and performs pseudonym replacement. ...
... We employ the average anonymous entropy to evaluate and compare the proposed scheme with DMLP [19] and AS [14]. DMLP allows vehicles to dynamically generate mixed regions and exchange pseudonyms in the mixed regions. ...
Article
Full-text available
In recent times, the issue of vehicle location privacy has received increasing attention. Location-based services (LBSs) require users’ location information to be constantly updated to service providers, which causes the location information to be speculated and attacked by malicious entities. The pseudonym schemes offer a viable solution to the aforementioned problem, but existing pseudonym schemes do not provide differentiated protection for users’ varying locations, thereby increasing the possibility of location information leakage. To address this concern, we propose a sensitivity-based pseudonym exchange mechanism, which leverages the vehicle’s historical track record to extract features and enable customized location privacy protection. Performance evaluation results demonstrate that our approach significantly outperforms existing approaches in achieving location privacy.
... Concept of the silent period for wireless location privacy [68], the combination of the silent period with group concept [69], path confusion, and path segmentation [70] 2006-2007 Concept of mix zone and stable time period [41], Cryptographic mix zones [71], Concept of random silent periods and grouping of vehicles [53] 2008 ...
... This generates a major difficulty for an adversary to recognize the movements of vehicles in the region, which preserves the privacy of vehicles. In [41], context information of vehicles is collected, such as the number of neighbor vehicles, speed, and direction for changing pseudonyms. Later on, other context information is taken in [77] such as the distance among vehicles, speed, and road section information. ...
Preprint
Full-text available
p>This is a review paper that includes: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities regarding location privacy schemes in VANETs</p
... Concept of the silent period for wireless location privacy [68], the combination of the silent period with group concept [69], path confusion, and path segmentation [70] 2006-2007 Concept of mix zone and stable time period [41], Cryptographic mix zones [71], Concept of random silent periods and grouping of vehicles [53] 2008 ...
... This generates a major difficulty for an adversary to recognize the movements of vehicles in the region, which preserves the privacy of vehicles. In [41], context information of vehicles is collected, such as the number of neighbor vehicles, speed, and direction for changing pseudonyms. Later on, other context information is taken in [77] such as the distance among vehicles, speed, and road section information. ...
Preprint
Full-text available
p>This is a review paper that includes: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities regarding location privacy schemes in VANETs</p
... Vehicles within small distance ranges are combined to make a group. Here, NeighThreshold is used to control the number of members in a group (the neighbor threshold contains the number of vehicles between 24 and 31, which is considered high traffic density according to [47]). If the number of vehicles is increasing in a group beyond the threshold, then the ReducedNeigh(limit) disjoins some vehicles from the group to reduce the burden in a group. ...
Article
Full-text available
Location privacy is an important parameter to be addressed in the case of vehicular ad hoc networks. Each vehicle frequently communicates with location-based services to find the nearest location of interest. The location messages communicated with the location server may contain sensitive information like vehicle identity, location, direction, and other headings. A Location-Based Services (LBS) server is not a trusted entity; it can interact with an adversary, compromising the location information of vehicles on the road and providing a way for an adversary to extract the future location tracks of a target vehicle. The existing works consider two or three neighboring vehicles as a virtual shadow to conceal location information. However, they did not fully utilize the semantic location information and pseudonym-changing process, which reduces the privacy protection level. Moreover, a lot of dummy location messages are generated that increase overheads in the network. To address these issues, we propose a Semantic Group Obfuscation (SGO) technique that utilizes both location semantics as well as an efficient pseudonym-changing scheme. SGO creates groups of similar status vehicles on the road and selects random position coordinates for communication with the LBS server. It hides the actual location of a target vehicle in a vicinity. The simulation results verify that the proposed scheme SGO improves the anonymization and entropy of vehicles, and it reduces the location traceability and overheads in the network in terms of computation cost and communication cost. The cost of overhead is reduced by 55% to 65% compared with existing schemes. We also formally model and specify SGO using High-Level Petri Nets (HLPNs), which show the correctness and appropriateness of the scheme.
... The traceability of a vehicle by an adversary, who attempts to intercept its route, is directly impacted by the pseudonym changing scheme. To minimize the risk of the adversary identifying the vehicle and its location, techniques such as silent periods [9], mixed zones [10], and contextbased [8] methods are employed to make the pseudonym change more effective. This paper proposes three new pseudonym changing schemes, namely SRSP (SLOW-based RSP), SCPN (SLOW-based CPN) and SCAPS (SLOW-based CAPS), to enhance location privacy in vehicular networks. ...
Preprint
Location privacy is a critical aspect of vehicular networks. Privacy schemes adopt diverse methods to minimize vehicle traceabil-ity. These schemes include pseudonym periodical changes, silent periods, context-based approaches, and cooperative pseudonym changes. It is important to maintain a discontinuity in the information sent by the vehicle to avoid reconstructing the vehicle trace. In this paper, we propose three privacy schemes that use SLOW as a baseline and combine it with other techniques: SLOW-based random silent periods, SLOW-based cooperative pseudonym change, and SLOW-based context-aware privacy scheme. These proposed schemes aim to enhance the original scheme by restricting their operations with intervals and thresholds and improving the management of silent periods. We evaluate the proposed schemes' performance in terms of traceability, computation time, pseudonym usage, and silence time. Results show that our schemes improve the original scheme in most tested metrics. The average improvement in traceability is 70%. Furthermore, our schemes reduce the silent period of the SLOW scheme by 17.40% on average.
... This technique involves several challenges, including minimizing overhead and synchronizing key management amongst RSUs to allow only one symmetrical key inside the system. Gerlach and Guttler's Mixcontext technique [24] used a flag in beacon messages to allow synchronous pseudonym changes when triggered. Beresford et al. proposed using mix-zones to change pseudonyms and confuse adversaries. ...
Article
Full-text available
Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users' privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.
... In summary, these privacy protection schemes are not suitable for the scenario of prompt response in VANET. Then many scholars use the pseudonym of the vehicle for communication [12][13][14][15][16]. Besides, the issue of traceability is also a hot topic in the VANET security. ...
Article
Full-text available
Vehicular ad-hoc network system provides network communication technology and plays an important role in road safety and traffic control. Conditional privacy-preserving can safeguard privacy as well as trace malicious vehicles, which is critical in the system. However, in the restricted computing and communication resource situation, how to ensure the conditional privacy security remains a challenge. To address this issue, this research work proposes an efficient conditional privacy-preserving scheme. In this scheme, firstly, a certificateless aggregation signature has been performed on board to avoid channel conflicts, and to our best knowledge, this scheme is the first one to propose aggregation on board. Also an elliptic curve point multiplicative operation has been utilized to decrease the cost consumed in computation. Secondly, this paper gives the security proof of the proposed scheme against the existence of unforgeability under adaptively chosen message attack for Type-I and Type-II adversaries in the random oracle model. Lastly, comprehensive performance comparisons covering the computation, communication and storage costs have been done to state that the proposed scheme is more efficient than the existing solutions. Significantly, this scheme saves at least 86% in communication overhead than compared schemes.
Article
Intelligent Transportation Systems (ITS) promise significant increases in throughput and reductions in trip delay. ITS makes extensive use of Connected and Autonomous Vehicles (CAV) frequently broadcasting location, speed, and intention information. However, with such extensive communication comes the risk to privacy. Preserving privacy while still exchanging vehicle state information has been recognized as an important problem. Mix zones have emerged as a potentially effective way of protecting user privacy in ITS. CAVs are assigned pseudonyms to mask their identity; a mix zone is an area where CAVs can change their pseudonyms to resist being tracked. In order to be effective, mix zone placement must take account of traffic flows. Also, since a mix zone can degrade throughput, mix zones must be used sparingly. Determining the number and placement of mix zones is a difficult dynamic optimization problem. This paper outlines the various approaches recently taken by researchers to deal with this problem.
Article
Full-text available
Vehicular Ad-hoc Networks (VANETs) play a crucial role in enabling efficient and safe communication among vehicles, contributing to advancements in intelligent transportation systems. However, VANETs face significant security and privacy challenges that must be addressed to ensure their widespread adoption. This research examines the threats encountered in VANETs, such as Sybil attacks, Denial of Service (DoS) attacks, data privacy breaches, location privacy concerns, message authentication issues, misbehaving nodes, and physical attacks. To mitigate these threats, various countermeasures are discussed, including public key infrastructure, intrusion detection systems, encryption techniques, pseudonym changing, reputation-based mechanisms, and physical security measures. Nonetheless, the dynamic nature of VANETs necessitates ongoing research and development to address emerging challenges and identify novel solutions. Future directions in this field involve exploring advanced cryptographic algorithms, machine learning-based anomaly detection techniques, and collaborative approaches among vehicles to enhance security and privacy in VANETs. The findings of this research contribute to the understanding of security and privacy challenges in VANETs and provide valuable insights for researchers, practitioners, and policymakers working towards secure and privacy-preserving vehicular communication systems. https://studies.eigenpub.com/index.php/erst/article/view/6
Article
Full-text available
In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastruc- ture. This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications. We first, identify the unique characteristics of VANET that must be considered when designing suitable location privacy solutions. Based on these observations, we propose a location privacy scheme called CARAVAN, and evaluate the privacy enhancement achieved under some existing standard constraints of VANET applications, and in the presence of a global adversary. I. I NTRODUCTION Vehicular ad hoc networks (VANET) enable vehicles to communicate among themselves (V2V communications) and with road-side infrastructure (V2I communications). Such net- works present various functionalities in terms of vehicular safety, traffic congestion reduction, and location based service (LBS) applications. Recognizing the potential of VANET, there has been concerted efforts (1), (2), (3) to network vehicles. However, many challenges including the security and privacy issues remain to be addressed (4), (5), (6). The unique requirements of maintaining liability of vehicles involved in accidents, and ensuring the safety rendered by the communication between vehicles, challenge the network connectivity, privacy, and certain security aspects (discussed later in Section III-D) in VANET. Moreover, advances in localization and tracking techniques enable accurate location estimation and tracking of vehicles in VANET. By tracking a vehicle, it becomes possible to identify the locations visited by the vehicle, thereby, breaching the privacy of the user of the vehicle. Furthermore, the location tracking information about a user can be misused by an adversary. Additionally, identifying the LBS applications accessed by a vehicle, provides private information of the vehicle's user. In this paper, we address the problem of allowing any vehicle to be able to achieve unlinkability between two or more of its locations in the presence of tracking by an adversary . For developing a suitable solution, unlike previous approaches for location privacy in mobile networks (see Section V-C), we account for the constraints posed by vehicular mobility and vehicular applications in VANET (see Section II-D). Contributions of this paper are the following. (1) We identify that the group navigationof vehicles can be used for providing location privacy in VANET. (2) We propose a location privacy scheme called CARAVAN, that combines the group navigation with a random silent period enhancement technique, to miti- gate tracking of a vehicle. (3) We leverage the group to provide
Article
Full-text available
Inter-vehicle communication systems are a new paradigm of networking. Largely related to mobile ad hoc networks and their distributed, self-organizing structure, they also introduce new threats. In order to assess these threats we introduce a model of attacks on an inter-vehicle communication system in this paper. This model is used to re-fine the system model of the NoW communication system and to find potential weaknesses during the specification phase of the NoW communication system. Our work shows that there are several interesting new challenges requiring novel solutions, some of which are out-lined at the end of this paper. Although this is still work in progress, it is the foundation for analysis and assessment of future work. As one of the main results of this paper, we identified sev-eral difficult to detect attacks on the hard-and software, and on the sensor input. We further point out system require-ments to thwart such attacks.
Conference Paper
Full-text available
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop a realistic trust model, and an architecture that supports our solution. In order to ascertain that most users will not find it meaningful to disconnect or disable transponders, we design our solution with several types of user incentives as part of the structure. Examples of resulting features include anonymous toll collection; improved emergency response; and personalized and route-dependent traffic information.
Conference Paper
Full-text available
As Global Positioning System (GPS) receivers become a common feature in cell phones, personal digital assistants, and automobiles, there is a growing interest in tracking larger user populations, rather than individual users. Unfortunately, anonymous location samples do not fully solve the privacy problem. An adversary could link multiple samples (i.e., follow the footsteps) to accumulate path information and eventually identify a user. This paper reports on our ongoing work to analyze privacy risks in such applications. We observe that linking anonymous location samples is related to the data association problem in tracking systems. We then propose to use such tracking algorithms to characterize the level of privacy and to derive disclosure control algorithms.
Conference Paper
Full-text available
Advances in sensing and tracking technology enable location-based applications but they also create signif- icant privacy risks. Anonymity can provide a high de- gree of privacy, save service users from dealing with service providers' privacy policies, and reduce the ser- vice providers' requirements for safeguarding private in- formation. However, guaranteeing anonymous usage of location-based services requires that the precise location information transmitted by a user cannot be easily used to re-identify the subject. This paper presents a mid- dleware architecture and algorithms that can be used by a centralized location broker service. The adaptive al- gorithms adjust the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area. Using a model based on automotive traffic counts and carto- graphic material, we estimate the realistically expected spatial resolution for different anonymity constraints. The median resolution generated by our algorithms is 125 meters. Thus, anonymous location-based requests for urban areas would have the same accuracy currently needed for E-911 services; this would provide sufficient resolution for wayfinding, automated bus routing ser- vices and similar location-dependent services.
Conference Paper
Ad-hoc wireless communication among highly dynamic, mobile nodes in a urban network is a critical capability for a wide range of important applications including automated vehicles, real-time traffic monitoring and vehicular safety applications. When evaluating application performance in simulation, a realistic mobility model for vehicular ad-hoc networks (VANETs) is critical for accurate results. This paper analyzes ad-hoc wireless network performance in a vehicular network in which nodes move according to a simplified vehicular traffic model on roads defined by real map data. We show that when nodes move according to our street mobility model, STRAW, network performance is significantly different from that of the commonly used random waypoint model. We also demonstrate that protocol performance varies with the type of urban environment. Finally, we use these results to argue for the development of integrated vehicular and network traffic simulators to evaluate vehicular ad-hoc network applications, particularly when the information passed through the network affects node mobility.
Conference Paper
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data traffic. At the same time, the easy access to information afforded by VANETs potentially enables the difficult security goal of data validation. We propose a general approach to evaluating the validity of VANET data. In our approach a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present. Explanations that are consistent with the node's model of the VANET are scored and the node accepts the data as dictated by the highest scoring explanations. Our techniques for generating and scoring explanations rely on two assumptions: 1) nodes can tell "at least some" other nodes apart from one another and 2) a parsimony argument accurately reflects adversarial behavior in a VANET. We justify both assumptions and demonstrate our approach on specific VANETs.
Conference Paper
Vehicular Ad-Hoc Networks are networks of communication between vehicles and roadside units. These networks have the potential to increase safety and provide many services to drivers, but they also present risks to privacy. Researching mechanism to protect privacy requires two key ingredients: 1. a precise definition of privacy that reflects citizens' concern and perceptions, and 2. an upstanding of the type of attacks in VANETs. In this research, we formulate a workable definition of privacy, and focus on tracking attacks, which we found to lacking. Although considerable research has been performed in tracking none of the published solutions ensures full protection. We propose to combine a set of published solutions, namely: Mix Zones, Silent Periods, and Group Signatures in order to improve the privacy of drivers. Vehicles enters a region where, vehicles change their pseudonyms (Mix Zone) as well as network addresses; next enter the silent period, and then use one group key for communication. It could help make tracking more difficult and increase the safety and confidence of drivers using VANET.