A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas

نویسندگان

چکیده

Large number of schemes have been proposed to deal with location privacy preservation in VANETs. One the most popular ways preserve is pseudonym changing, which includes mix-zone, silent zone, mix-context zone and trigger-based schemes. The pseudonyms must be changed after a specific interval privacy. All these require vehicles part dense traffic order change pseudonym. Although changing are not computationally expensive ensure preservation, huge drawback that suitable only for areas, they do apply sparse areas. Another prevent from colluding attacks. In this research, we propose scheme, called LPSA (Location Privacy Sparse Areas), allows work areas where dense. A area density lower as compared silent-zone zones. does private changing. This makes it both For utilize zones, while modify scheme also provides protection Our results show better traceability, average anonymity set size, per trace confusion

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Clustering K-Anonymity Scheme for Location Privacy Preservation

The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of LocationBased Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity sche...

متن کامل

A Dynamic Game Analysis of Pseudonym Changes for Location Privacy

Authentication (i.e the possibility to verify the identity of communicating parties) is a prerequisite to provide security in mobile ad hoc networks (vehicular networks [9], delay tolerant networks[5], etc). This is usually achieved using asymmetric cryptography. Mobile nodes are preloaded with an asymmetric key pair consisting of one public key and one private key. The private key is used to s...

متن کامل

A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems

Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. Therefore, the vehicles acquire a set of pseudonyms from the ...

متن کامل

An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures

An emerging class of Location Based Services (LBSs) needs verified mobile device locations for service provision. For example, an automated car park billing system requires verified locations of cars to confirm the place and the duration of parked cars. Location Proof Architectures (LPAs) allow a user (or a device on behalf of its user) to obtain a proof of its presence at a location from a tru...

متن کامل

Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks

Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a contextadaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3303846