Pseudonym change strategy based on the reputation of the neighbouring vehicles in VANETs
Estrategia de cambio de seudónimo basada en la reputación de los vehículos vecinos en VANETs
DOI:
https://doi.org/10.15446/dyna.v86n211.75602Palabras clave:
Vehicular Network, Privacy, Pseudonym Changing, Reputation. (en)Red vehicular, Privacidad, Cambio de Pseudónimo, Reputación. (es)
Descargas
Referencias
IEEE Vehicular Technology Society. IEEE Standard for wireless access in vehicular environments - security services for applications and management messages. IEEE std. 1609.2- 2013 (Revision of IEEE
Std 1609.2-2013), March, pp. 1-240, 2016. DOI: 10.1109/IEEESTD.2016.7426684
ETSI. Etsi ts 102 941 v1.1.1- Intelligent Transport Systems (ITS); security, trust and privacy management, Technical Report, 2012.
De Fuentes, J.M., González-Tablas, A.I. and Ribagorda, A., Overview of security issues in vehicular ad-hoc networks. In: Handbook of research on mobility and computing: evolving technologies and ubiquitous impacts. IGI Global, 2011. pp. 894-911. DOI: 10.4018/978-1-60960-042-6.ch056
Santos-Jaimes, L.M., Ullah, K. and Moreira, E dos S., A secure commercial ads dissemination scheme for vehicular networks, Proceedings of 8th IEEE Latin-American Conference on Communications (LATINCOM). Medellín: IEEE, [online]. 2016. Available at: https://ieeexplore.ieee.org/document/7811610/. DOI: 10.1109/LATINCOM.2016.7811610
Santos-Jaimes, L.M, Ullah, K. and Moreira E dos S., ARS: anonymous reputation system for vehicular ad hoc networks. Proceedings of 8th IEEE Latin-American Conference on Communications (LATINCOM). Medellín: IEEE, [online]. 2016. Available at: https://ieeexplore.ieee.org/document/7811600/. DOI: 10.1109/LATINCOM.2016.7811600
Liao, J. and Li, J., Effectively changing pseudonyms for privacy protection in vanets. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks. Kaohsiung: IEEE, [online]. 2009, pp. 648-652, Available at: https://ieeexplore.ieee.org/document/5381686/.
DOI: 10.1109/I-SPAN.2009.103
Moghraoui, K. and Amar-Bensaber, B., An efficient pseudonym change protocol based on trusted neighbours for privacy and anonymity in VANETs. Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications. Cancun, ACM, [online]. 2015, pp. 93-99. Available at: https://dl.acm.org/citation.cfm?doid=2815347.2815355. DOI: 10.1145/2815347.2815355
Ying, B. and Makrakis, D., Reputation-based pseudonym change for location privacy in vehicular networks. Proceedings of International Conference on Communications (ICC). London: IEEE, [online]. pp. 7041-7046, 2015. Available at: https://ieeexplore.ieee.org/document/7249449/. DOI: 10.1109/ICC.2015.7249449
Ying, B., Makrakis, D. and Mouftah, H.T., Dynamic mix-zone for location privacy in vehicular networks. IEEE Communications Letters, 17(8), [online]. pp. 1524-1527, 2013. Available at: https://ieeexplore.ieee.org/document/6560048. DOI: 10.1109/LCOMM.2013.070113.122816
Li, M., Sampigethaya, K., Huang, L., et al., Swing & swap: user-centric approaches towards maximizing location privacy. Proceedings of the 5th ACM workshop on Privacy in electronic society. Alexandria: ACM, [online]. pp. 19-28, 2006. Available at: https://labs.ece.uw.edu/nsl/papers/WPES-2006.pdf. DOI: 10.1145/1179601.1179605
Chaurasia, B.K. and Verma, S., Optimizing pseudonym updation for anonymity in vanets. Proceedings of Asia-Pacific Services Computing Conference APSCC’08. Yilan: IEEE, [online]. pp. 1633-1637, 2008. Available at: https://ieeexplore.ieee.org/document/4780916/. DOI: 10.1109/APSCC.2008.110
Chaurasia, B.K., Verma, S., Tomar, G.S., et al., Pseudonym based mechanism for sustaining privacy in vanets. Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks. Indore: IEEE, [online]. pp. 420-425, 2009. Available at: https://ieeexplore.ieee.org/document/5231877/. DOI: 10.1109/CICSYN.2009.79
Chen, Y.S., Lo, T.T., Lee, C.H., et al., C. Efficient pseudonym changing schemes for location privacy protection in VANETs. Proceedings of International Conference on Connected Vehicles and Expo (ICCVE). Las Vegas: IEEE, [online]. pp. 937-938, 2013. Available at: https://ieeexplore.ieee.org/document/6799933/. DOI: 10.1109/ICCVE.2013.6799933
Eckhoff, D., Sommer, C., Gansen, T., et al., Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping. Proceedings of Vehicular Networking Conference (VNC). Jersey: IEEE, [online]. pp. 174-181, 2010. Available at: https://ieeex plore.ieee.org/document/5698239/. DOI: 10.1109/VNC.2010.5698239
Ishtiaq-Roufa, R.M., Mustafaa, H., Travis-Taylora, S.O., et al., Security and privacy vulnerabilities of in-car wireless networks: A tirepressure monitoring system case study. Proceedings of 9th USENIX Security Symposium. Washington DC: pp. 11-13, 2010.
Pan, Y., Li, J., Feng, L., et al.,
An analytical model for random changing pseudonyms scheme in vanets. Proceedings of International Conference on Network Computing and Information Security (NCIS). Guilin: IEEE Computer Society, pp. 141-145, 2011. DOI: 10.1109/NCIS.2011.127
Pan, Y., Li, J., Feng, L., et al., An analytical model for random pseudonym change scheme in VANETs. Cluster Computing. 17(2), pp. 413-421, 2014. DOI: 10.1007/s10586-012-0242-7
Gerlach, M., Assessing and improving privacy in vanets. In: ESCAR, Embedded Security in Cars. 2006. DOI:10.1.1.84.8167&rep=rep1&type=pdf
Gerlach, M. and Guttler, F., Privacy in vanets using changing pseudonyms ideal and real. Proceedings of 65th Vehicular Technology Conference- VTC2007-Spring. Dublin: IEEE, [online]. pp. 2521-2525, 2007. Available at: https://ieeexplore.ieee.org/document/4212947/. DOI: 10.1109/VETECS.2007.519
Li, M., Sampigethaya, K., Huang, L., et al., Swing & swap: user-centric approaches towards maximizing location privacy. Proceedings of the 5th ACM workshop on Privacy in electronic society ACM, pp. 19-28, 2006. DOI: 10.1145/1179601.1179605
Freudiger, J., Manshaei, M.H., Le- Boudec, J.Y., et al., On the age of pseudonyms in mobile ad hoc networks. Proceedings of IEEE INFOCOM. San Diego: IEEE, [online]. pp. 1-9, 2010. Available at: https://ieeexplore.ieee.org/document/5461975/. DOI: 10.1109/INFCOM.2010.5461975
Liao, J., Li, J. and Pan, Y., Cooperatively changing pseudonyms for privacy protection in vanets. Proceedings of the 2nd IEEE international conference on wireless access in vehicular environments (WAVE). Shanghai, pp. 13-8, 2009. DOI: 10.1109/I-SPAN.2009.103
Pan, Y. and Li, J., Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network and Computer Applications. 36(6), pp. 1599-1609, 2013. DOI: 10.1016/j.jnca.2013.02.003
Lauter, K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless communications. 11(1), pp. 62-67, 2004. DOI: 10.1109/MWC.2004.1269719
ETSI. Intelligent Transport Systems (ITS), security, security header and certificate formats. Technical Report. ETSI TS 103 097, 2015.
Turner, S., Housley, R., Polk, T., et al., Elliptic curve cryptography subject public key information. RFC 5480, 2009.
Hamida, E.B., Noura, H. and Znaidi W., Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics. 4(3), pp. 380-423, 2015. DOI:10.3390/electronics4030380
Ma, Z., Kargl, F. and Weber M., Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. Proceedings of 68th Vehicular Technology Conference VTC. Calgary: IEEE, [online]. pp. 1-5, 2008. Available at: https://ieeexplore.ieee.org/document/4657287/. DOI: 10.1109/VETECF.2008.455
Beresford, A.R. and Stajano, F., Mix zones: user privacy in location aware services. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. Orlando: IEEE, [online]. pp. 127-131. 2004. Available at: https://ieeexplore.ieee.org/document/1276918/. DOI:10.1109/PERCOMW.2004.1276918
Freudiger, J., Raya, M., Félegyházi, M., et al., Mix-zones for location privacy in vehicular networks. Proceedings of ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS). Vancouver: Infoscience, 2007. DOI: 10.1109/ACCESS.2018.2800907
Alexiou, N., Laganà, M., Gisdakis, S., et al., Vespa: vehicular security and privacy-preserving architecture. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM, [online]. pp. 19-24, 2013. Available at: https://dl.acm.org/citation.cfm?doid=2463183.2463189. DOI:10.1145/2463183.2463189
Lu, R., Lin, X., Luan, T. H., et al., Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE transactions on vehicular technology. [online]. 61(1), pp.86-96, 2011. Available at: https://ieeexplore.ieee.org/document/5960806/. DOI: 10.1109/TVT.2011.2162864
Buttyán, L., Holczer, T. and Vajda, I., On the effectiveness of changing pseudonyms to provide location privacy in vanets. Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks. Berlin: Springer, pp. 129-141, 2007. DOI: 10.1007/978-3-540-73275-4_10
Santos-Jaimes, L.M. and Moreira, E., An evaluation of reputation with regard to the opportunistic forwarding of messages in VANETs. EURASIP Journal on Wireless Communications and Networking. 2019(1), pp. 1-14, 2019. DOI: 10.1186/s13638-019-1518-x
Vanni-P., R.M., Santos-J., L.M., Mapp, G., et al., Ontology driven reputation model for vanet. Proceedings of AICT 2016, The Twelfth Advanced International Conference on Telecommunications. Barcelona: IARIA, pp. 14-19, 2016.
Yokoyama, R.S., Kimura, B.Y., Santos-J, L.M., et al., A beaconing-based opportunistic service discovery protocol for vehicular networks. Proceedings of 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Victoria: IEEE, [online]. pp. 498-503, 2014. Available at: https://ieeexplore.ieee.org/abstract/document/6844686/. DOI: 10.1109/WAINA.2014.82
Ullah, K., Santos-J., L.M., Yokoyama, R.S., et al., Advertising roadside services using vehicular ad hoc network (vanet) opportunistic capabilities. Proceedings of 4th International Conference on Advances in Vehicular Systems, Technologies and Applications. Julians: IARIA, pp. 7-13, 2015.
Ullah, K., Santos-J., L.M., Ribeiro, J.B., et al., Sadp: a lightweight beaconing-based commercial services advertisement protocol for vehicular ad hoc network. Proceedings of International Conference on Ad-Hoc Networks and Wireless. Lille: Springer, pp. 279-293, 2016. DOI:10.1007/978-3-319-40509-4_20
Bidóia, M.C., Cavenaghi, M.A., Spolon, R., et al., Simulation of a centralized reputation system for vanets. Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA). The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2014.
German Aerospace Center, Institute of Transportation Systems. SUMO Simulation of Urban Mobility [online]. [Consulted in: June of 2018]. Available at: http://sumo.dlr.de/index.html
OpenSim Ltd., Omnet++ discrete event simulator. [online]. [Consulted in: June of 2018]. Available at: https://omnetpp.org/
Christoph Sommer. The open source vehicular network simulation framework [online]. [Consulted in: June of 2018]. Available at: http://veins.car2x.org/
Crypto++ community. Crypto++ library 5.6.5 [online]. [Consulted in: June of 2018]. Available at: http://www.cryptopp.com/
Bieker, L., Krajzewicz, D., Morra, A., et al., Traffic simulation for all: a real world traffic scenario from the city of bologna. Proceedings of Modeling Mobility with Open Data, 2nd SUMO Conference. Berlin, Springer, pp. 47-60, 2015. DOI:10.1007/978-3-319-15024-6_4
German Aerospace Center (DLR). Data scenarios. Bologna [online]. [Consulted in: June of 2018]. Available at: https://sumo.dlr.de/docs/Data/Scenarios.html#bologna
Cómo citar
IEEE
ACM
ACS
APA
ABNT
Chicago
Harvard
MLA
Turabian
Vancouver
Descargar cita
CrossRef Cited-by
1. Ikjot Saini, Sherif Saad, Arunita Jaekel. (2022). A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks. Internet of Things, 19, p.100559. https://doi.org/10.1016/j.iot.2022.100559.
2. Ikjot Saini, Benjamin St. Amour, Arunita Jaekel. (2020). Intelligent Adversary Placements for Privacy Evaluation in VANET. Information, 11(9), p.443. https://doi.org/10.3390/info11090443.
3. Zhixiang Zhang, Wai-Choong Wong, Biplab Sikdar. (2024). A Hybrid Reinforcement Learning-Based Method for Generating Privacy-Preserving Trajectories in Low-Density Traffic Environments. IEEE Transactions on Intelligent Transportation Systems, 25(10), p.14740. https://doi.org/10.1109/TITS.2024.3400312.
4. Leila Benarous, Sherali Zeadally, Saadi Boudjit, Abdelhamid Mellouk. (2025). A Review of Pseudonym Change Strategies for Location Privacy Preservation Schemes in Vehicular Networks. ACM Computing Surveys, 57(8), p.1. https://doi.org/10.1145/3718736.
5. Mishri Saleh Al-Marshoud, Ali H. Al-Bayatti, Mehmet Sabir Kiraz. (2021). Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs. Electronics, 10(11), p.1302. https://doi.org/10.3390/electronics10111302.
6. Leila Benarous, Saadi Boudjit. (2022). Location Privacy in Vehicular Networks: Analytical Review of Existing Solutions. 2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN). , p.1. https://doi.org/10.23919/PEMWN56085.2022.9963891.
7. Xiaoshuang Xing, Gaofei Sun, Jin Qian, Dongxiao Yu, Xiuzhen Cheng. (2022). Intermittent jamming for eavesdropping defense in WAVE based vehicular networks. Vehicular Communications, 38, p.100542. https://doi.org/10.1016/j.vehcom.2022.100542.
8. Luqman Muhammad Zagi, Baharuddin Aziz. (2020). Privacy Attack On IoT: a Systematic Literature Review. 2020 International Conference on ICT for Smart Society (ICISS). , p.1. https://doi.org/10.1109/ICISS50791.2020.9307568.
Dimensions
PlumX
Visitas a la página del resumen del artículo
Descargas
Licencia
Derechos de autor 2019 DYNA

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-SinDerivadas 4.0.
El autor o autores de un artículo aceptado para publicación en cualquiera de las revistas editadas por la facultad de Minas cederán la totalidad de los derechos patrimoniales a la Universidad Nacional de Colombia de manera gratuita, dentro de los cuáles se incluyen: el derecho a editar, publicar, reproducir y distribuir tanto en medios impresos como digitales, además de incluir en artículo en índices internacionales y/o bases de datos, de igual manera, se faculta a la editorial para utilizar las imágenes, tablas y/o cualquier material gráfico presentado en el artículo para el diseño de carátulas o posters de la misma revista.




