Publicado

2019-10-01

Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs

Estrategia de cambio de seudónimo basada en la reputación de los vehículos vecinos en VANETs

DOI:

https://doi.org/10.15446/dyna.v86n211.75602

Palabras clave:

Vehicular Network, Privacy, Pseudonym Changing, Reputation. (en)
Red vehicular, Privacidad, Cambio de Pseudónimo, Reputación. (es)

Autores/as

Pseudonym change schemes have been studied in VANETs to guarantee the property of untraceability of the vehicles. This paper proposes a new condition based on the assumption that if there are no malicious vehicles around when a synchronous change triggers, there is no risk of tracking, and the pseudonym change defers until a time threshold. Thus, our proposal based on a synchronous strategy to increase the anonymity set, adds to the change condition, the checking of the reputation status of the neighbouring vehicles. The reputation status is the result of discretizing the reputation score of the vehicles and it is part of the periodically broadcast beacon messages. The proposal was evaluated through simulations using a real scenario. The results showed an optimization in the use of pseudonyms maintaining similar anonymity levels with other schemes.
Esquemas de cambio de seudónimos han sido estudiados en VANETs para garantizar la propiedad de no rastreo de los vehículos. Este artículo propone una nueva condición basada sobre la suposición de que sí no hay vehículos maliciosos alrededor cuando un cambio síncrono activa, no hay riesgo de rastreo, y el cambio de pseudónimo es extendido hasta un máximo tiempo de espera. Así, nuestra propuesta basada en una estrategia síncrona, adiciona a la condición de cambio, el chequeo del estatus de reputación de los vehículos vecinos. El estado de reputación es el resultado de discretizar la puntuación de reputación de los vehículos y es parte de los mensajes de seguridad difundidos periódicamente. La propuesta fue evaluada mediante simulaciones usando un escenario real. Los resultados mostraron una optimización en el uso de pseudónimos manteniendo niveles de anonimidad similar con otros esquemas.

Referencias

IEEE Vehicular Technology Society. IEEE Standard for wireless access in vehicular environments - security services for applications and management messages. IEEE std. 1609.2- 2013 (Revision of IEEE

Std 1609.2-2013), March, pp. 1-240, 2016. DOI: 10.1109/IEEESTD.2016.7426684

ETSI. Etsi ts 102 941 v1.1.1- Intelligent Transport Systems (ITS); security, trust and privacy management, Technical Report, 2012.

De Fuentes, J.M., González-Tablas, A.I. and Ribagorda, A., Overview of security issues in vehicular ad-hoc networks. In: Handbook of research on mobility and computing: evolving technologies and ubiquitous impacts. IGI Global, 2011. pp. 894-911. DOI: 10.4018/978-1-60960-042-6.ch056

Santos-Jaimes, L.M., Ullah, K. and Moreira, E dos S., A secure commercial ads dissemination scheme for vehicular networks, Proceedings of 8th IEEE Latin-American Conference on Communications (LATINCOM). Medellín: IEEE, [online]. 2016. Available at: https://ieeexplore.ieee.org/document/7811610/. DOI: 10.1109/LATINCOM.2016.7811610

Santos-Jaimes, L.M, Ullah, K. and Moreira E dos S., ARS: anonymous reputation system for vehicular ad hoc networks. Proceedings of 8th IEEE Latin-American Conference on Communications (LATINCOM). Medellín: IEEE, [online]. 2016. Available at: https://ieeexplore.ieee.org/document/7811600/. DOI: 10.1109/LATINCOM.2016.7811600

Liao, J. and Li, J., Effectively changing pseudonyms for privacy protection in vanets. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks. Kaohsiung: IEEE, [online]. 2009, pp. 648-652, Available at: https://ieeexplore.ieee.org/document/5381686/.

DOI: 10.1109/I-SPAN.2009.103

Moghraoui, K. and Amar-Bensaber, B., An efficient pseudonym change protocol based on trusted neighbours for privacy and anonymity in VANETs. Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications. Cancun, ACM, [online]. 2015, pp. 93-99. Available at: https://dl.acm.org/citation.cfm?doid=2815347.2815355. DOI: 10.1145/2815347.2815355

Ying, B. and Makrakis, D., Reputation-based pseudonym change for location privacy in vehicular networks. Proceedings of International Conference on Communications (ICC). London: IEEE, [online]. pp. 7041-7046, 2015. Available at: https://ieeexplore.ieee.org/document/7249449/. DOI: 10.1109/ICC.2015.7249449

Ying, B., Makrakis, D. and Mouftah, H.T., Dynamic mix-zone for location privacy in vehicular networks. IEEE Communications Letters, 17(8), [online]. pp. 1524-1527, 2013. Available at: https://ieeexplore.ieee.org/document/6560048. DOI: 10.1109/LCOMM.2013.070113.122816

Li, M., Sampigethaya, K., Huang, L., et al., Swing & swap: user-centric approaches towards maximizing location privacy. Proceedings of the 5th ACM workshop on Privacy in electronic society. Alexandria: ACM, [online]. pp. 19-28, 2006. Available at: https://labs.ece.uw.edu/nsl/papers/WPES-2006.pdf. DOI: 10.1145/1179601.1179605

Chaurasia, B.K. and Verma, S., Optimizing pseudonym updation for anonymity in vanets. Proceedings of Asia-Pacific Services Computing Conference APSCC’08. Yilan: IEEE, [online]. pp. 1633-1637, 2008. Available at: https://ieeexplore.ieee.org/document/4780916/. DOI: 10.1109/APSCC.2008.110

Chaurasia, B.K., Verma, S., Tomar, G.S., et al., Pseudonym based mechanism for sustaining privacy in vanets. Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks. Indore: IEEE, [online]. pp. 420-425, 2009. Available at: https://ieeexplore.ieee.org/document/5231877/. DOI: 10.1109/CICSYN.2009.79

Chen, Y.S., Lo, T.T., Lee, C.H., et al., C. Efficient pseudonym changing schemes for location privacy protection in VANETs. Proceedings of International Conference on Connected Vehicles and Expo (ICCVE). Las Vegas: IEEE, [online]. pp. 937-938, 2013. Available at: https://ieeexplore.ieee.org/document/6799933/. DOI: 10.1109/ICCVE.2013.6799933

Eckhoff, D., Sommer, C., Gansen, T., et al., Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping. Proceedings of Vehicular Networking Conference (VNC). Jersey: IEEE, [online]. pp. 174-181, 2010. Available at: https://ieeex plore.ieee.org/document/5698239/. DOI: 10.1109/VNC.2010.5698239

Ishtiaq-Roufa, R.M., Mustafaa, H., Travis-Taylora, S.O., et al., Security and privacy vulnerabilities of in-car wireless networks: A tirepressure monitoring system case study. Proceedings of 9th USENIX Security Symposium. Washington DC: pp. 11-13, 2010.

Pan, Y., Li, J., Feng, L., et al.,

An analytical model for random changing pseudonyms scheme in vanets. Proceedings of International Conference on Network Computing and Information Security (NCIS). Guilin: IEEE Computer Society, pp. 141-145, 2011. DOI: 10.1109/NCIS.2011.127

Pan, Y., Li, J., Feng, L., et al., An analytical model for random pseudonym change scheme in VANETs. Cluster Computing. 17(2), pp. 413-421, 2014. DOI: 10.1007/s10586-012-0242-7

Gerlach, M., Assessing and improving privacy in vanets. In: ESCAR, Embedded Security in Cars. 2006. DOI:10.1.1.84.8167&rep=rep1&type=pdf

Gerlach, M. and Guttler, F., Privacy in vanets using changing pseudonyms ideal and real. Proceedings of 65th Vehicular Technology Conference- VTC2007-Spring. Dublin: IEEE, [online]. pp. 2521-2525, 2007. Available at: https://ieeexplore.ieee.org/document/4212947/. DOI: 10.1109/VETECS.2007.519

Li, M., Sampigethaya, K., Huang, L., et al., Swing & swap: user-centric approaches towards maximizing location privacy. Proceedings of the 5th ACM workshop on Privacy in electronic society ACM, pp. 19-28, 2006. DOI: 10.1145/1179601.1179605

Freudiger, J., Manshaei, M.H., Le- Boudec, J.Y., et al., On the age of pseudonyms in mobile ad hoc networks. Proceedings of IEEE INFOCOM. San Diego: IEEE, [online]. pp. 1-9, 2010. Available at: https://ieeexplore.ieee.org/document/5461975/. DOI: 10.1109/INFCOM.2010.5461975

Liao, J., Li, J. and Pan, Y., Cooperatively changing pseudonyms for privacy protection in vanets. Proceedings of the 2nd IEEE international conference on wireless access in vehicular environments (WAVE). Shanghai, pp. 13-8, 2009. DOI: 10.1109/I-SPAN.2009.103

Pan, Y. and Li, J., Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network and Computer Applications. 36(6), pp. 1599-1609, 2013. DOI: 10.1016/j.jnca.2013.02.003

Lauter, K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless communications. 11(1), pp. 62-67, 2004. DOI: 10.1109/MWC.2004.1269719

ETSI. Intelligent Transport Systems (ITS), security, security header and certificate formats. Technical Report. ETSI TS 103 097, 2015.

Turner, S., Housley, R., Polk, T., et al., Elliptic curve cryptography subject public key information. RFC 5480, 2009.

Hamida, E.B., Noura, H. and Znaidi W., Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics. 4(3), pp. 380-423, 2015. DOI:10.3390/electronics4030380

Ma, Z., Kargl, F. and Weber M., Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. Proceedings of 68th Vehicular Technology Conference VTC. Calgary: IEEE, [online]. pp. 1-5, 2008. Available at: https://ieeexplore.ieee.org/document/4657287/. DOI: 10.1109/VETECF.2008.455

Beresford, A.R. and Stajano, F., Mix zones: user privacy in location aware services. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. Orlando: IEEE, [online]. pp. 127-131. 2004. Available at: https://ieeexplore.ieee.org/document/1276918/. DOI:10.1109/PERCOMW.2004.1276918

Freudiger, J., Raya, M., Félegyházi, M., et al., Mix-zones for location privacy in vehicular networks. Proceedings of ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS). Vancouver: Infoscience, 2007. DOI: 10.1109/ACCESS.2018.2800907

Alexiou, N., Laganà, M., Gisdakis, S., et al., Vespa: vehicular security and privacy-preserving architecture. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM, [online]. pp. 19-24, 2013. Available at: https://dl.acm.org/citation.cfm?doid=2463183.2463189. DOI:10.1145/2463183.2463189

Lu, R., Lin, X., Luan, T. H., et al., Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE transactions on vehicular technology. [online]. 61(1), pp.86-96, 2011. Available at: https://ieeexplore.ieee.org/document/5960806/. DOI: 10.1109/TVT.2011.2162864

Buttyán, L., Holczer, T. and Vajda, I., On the effectiveness of changing pseudonyms to provide location privacy in vanets. Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks. Berlin: Springer, pp. 129-141, 2007. DOI: 10.1007/978-3-540-73275-4_10

Santos-Jaimes, L.M. and Moreira, E., An evaluation of reputation with regard to the opportunistic forwarding of messages in VANETs. EURASIP Journal on Wireless Communications and Networking. 2019(1), pp. 1-14, 2019. DOI: 10.1186/s13638-019-1518-x

Vanni-P., R.M., Santos-J., L.M., Mapp, G., et al., Ontology driven reputation model for vanet. Proceedings of AICT 2016, The Twelfth Advanced International Conference on Telecommunications. Barcelona: IARIA, pp. 14-19, 2016.

Yokoyama, R.S., Kimura, B.Y., Santos-J, L.M., et al., A beaconing-based opportunistic service discovery protocol for vehicular networks. Proceedings of 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Victoria: IEEE, [online]. pp. 498-503, 2014. Available at: https://ieeexplore.ieee.org/abstract/document/6844686/. DOI: 10.1109/WAINA.2014.82

Ullah, K., Santos-J., L.M., Yokoyama, R.S., et al., Advertising roadside services using vehicular ad hoc network (vanet) opportunistic capabilities. Proceedings of 4th International Conference on Advances in Vehicular Systems, Technologies and Applications. Julians: IARIA, pp. 7-13, 2015.

Ullah, K., Santos-J., L.M., Ribeiro, J.B., et al., Sadp: a lightweight beaconing-based commercial services advertisement protocol for vehicular ad hoc network. Proceedings of International Conference on Ad-Hoc Networks and Wireless. Lille: Springer, pp. 279-293, 2016. DOI:10.1007/978-3-319-40509-4_20

Bidóia, M.C., Cavenaghi, M.A., Spolon, R., et al., Simulation of a centralized reputation system for vanets. Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA). The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2014.

German Aerospace Center, Institute of Transportation Systems. SUMO Simulation of Urban Mobility [online]. [Consulted in: June of 2018]. Available at: http://sumo.dlr.de/index.html

OpenSim Ltd., Omnet++ discrete event simulator. [online]. [Consulted in: June of 2018]. Available at: https://omnetpp.org/

Christoph Sommer. The open source vehicular network simulation framework [online]. [Consulted in: June of 2018]. Available at: http://veins.car2x.org/

Crypto++ community. Crypto++ library 5.6.5 [online]. [Consulted in: June of 2018]. Available at: http://www.cryptopp.com/

Bieker, L., Krajzewicz, D., Morra, A., et al., Traffic simulation for all: a real world traffic scenario from the city of bologna. Proceedings of Modeling Mobility with Open Data, 2nd SUMO Conference. Berlin, Springer, pp. 47-60, 2015. DOI:10.1007/978-3-319-15024-6_4

German Aerospace Center (DLR). Data scenarios. Bologna [online]. [Consulted in: June of 2018]. Available at: https://sumo.dlr.de/docs/Data/Scenarios.html#bologna

Cómo citar

IEEE

[1]
L. M. S. Jaimes y E. dos Santos Moreira, «Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs», DYNA, vol. 86, n.º 211, pp. 157–166, oct. 2019.

ACM

[1]
Jaimes, L.M.S. y dos Santos Moreira, E. 2019. Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs. DYNA. 86, 211 (oct. 2019), 157–166. DOI:https://doi.org/10.15446/dyna.v86n211.75602.

ACS

(1)
Jaimes, L. M. S.; dos Santos Moreira, E. Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs. DYNA 2019, 86, 157-166.

APA

Jaimes, L. M. S. & dos Santos Moreira, E. (2019). Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs. DYNA, 86(211), 157–166. https://doi.org/10.15446/dyna.v86n211.75602

ABNT

JAIMES, L. M. S.; DOS SANTOS MOREIRA, E. Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs. DYNA, [S. l.], v. 86, n. 211, p. 157–166, 2019. DOI: 10.15446/dyna.v86n211.75602. Disponível em: https://revistas.unal.edu.co/index.php/dyna/article/view/75602. Acesso em: 7 mar. 2026.

Chicago

Jaimes, Luz Marina Santos, y Edson dos Santos Moreira. 2019. «Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs». DYNA 86 (211):157-66. https://doi.org/10.15446/dyna.v86n211.75602.

Harvard

Jaimes, L. M. S. y dos Santos Moreira, E. (2019) «Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs», DYNA, 86(211), pp. 157–166. doi: 10.15446/dyna.v86n211.75602.

MLA

Jaimes, L. M. S., y E. dos Santos Moreira. «Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs». DYNA, vol. 86, n.º 211, octubre de 2019, pp. 157-66, doi:10.15446/dyna.v86n211.75602.

Turabian

Jaimes, Luz Marina Santos, y Edson dos Santos Moreira. «Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs». DYNA 86, no. 211 (octubre 1, 2019): 157–166. Accedido marzo 7, 2026. https://revistas.unal.edu.co/index.php/dyna/article/view/75602.

Vancouver

1.
Jaimes LMS, dos Santos Moreira E. Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs. DYNA [Internet]. 1 de octubre de 2019 [citado 7 de marzo de 2026];86(211):157-66. Disponible en: https://revistas.unal.edu.co/index.php/dyna/article/view/75602

Descargar cita

CrossRef Cited-by

CrossRef citations8

1. Ikjot Saini, Sherif Saad, Arunita Jaekel. (2022). A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks. Internet of Things, 19, p.100559. https://doi.org/10.1016/j.iot.2022.100559.

2. Ikjot Saini, Benjamin St. Amour, Arunita Jaekel. (2020). Intelligent Adversary Placements for Privacy Evaluation in VANET. Information, 11(9), p.443. https://doi.org/10.3390/info11090443.

3. Zhixiang Zhang, Wai-Choong Wong, Biplab Sikdar. (2024). A Hybrid Reinforcement Learning-Based Method for Generating Privacy-Preserving Trajectories in Low-Density Traffic Environments. IEEE Transactions on Intelligent Transportation Systems, 25(10), p.14740. https://doi.org/10.1109/TITS.2024.3400312.

4. Leila Benarous, Sherali Zeadally, Saadi Boudjit, Abdelhamid Mellouk. (2025). A Review of Pseudonym Change Strategies for Location Privacy Preservation Schemes in Vehicular Networks. ACM Computing Surveys, 57(8), p.1. https://doi.org/10.1145/3718736.

5. Mishri Saleh Al-Marshoud, Ali H. Al-Bayatti, Mehmet Sabir Kiraz. (2021). Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs. Electronics, 10(11), p.1302. https://doi.org/10.3390/electronics10111302.

6. Leila Benarous, Saadi Boudjit. (2022). Location Privacy in Vehicular Networks: Analytical Review of Existing Solutions. 2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN). , p.1. https://doi.org/10.23919/PEMWN56085.2022.9963891.

7. Xiaoshuang Xing, Gaofei Sun, Jin Qian, Dongxiao Yu, Xiuzhen Cheng. (2022). Intermittent jamming for eavesdropping defense in WAVE based vehicular networks. Vehicular Communications, 38, p.100542. https://doi.org/10.1016/j.vehcom.2022.100542.

8. Luqman Muhammad Zagi, Baharuddin Aziz. (2020). Privacy Attack On IoT: a Systematic Literature Review. 2020 International Conference on ICT for Smart Society (ICISS). , p.1. https://doi.org/10.1109/ICISS50791.2020.9307568.

Dimensions

PlumX

Visitas a la página del resumen del artículo

460

Descargas

Los datos de descargas todavía no están disponibles.