Cooperative pseudonym change scheme based on the number of neighbors in VANETs
نویسندگان
چکیده
In Vehicular Ad hoc NETworks (VANETs), trigger-based pseudonym change schemes play an important role in providing anonymity. However, the anonymity provided by these schemes usually is low mainly because the behavior of changing pseudonym is individual. Considering cooperation on changing pseudonym can enhance anonymity, in this paper, we give a general cooperation framework. As an application of the framework, we present a Cooperative Pseudonym change scheme based on the number of Neighbors (CPN). We generally analyze the anonymity provided by the CPN scheme and qualitatively compare the scheme with its corresponding scheme without cooperation, Non-CPN (NCPN). Then, under uniform traffic distribution, we develop an approximate analytical model for CPN in relatively simple one-lane VANETs to analyze the anonymity. Finally, we investigate the anonymity of CPN in one-lane and multi-lane VANETs by simulation. The results show that the ratio of the size of anonymity set in multi-lane to that in one-lane VANETs, first quickly goes up, then slowly decreases a bit, and at last approaches the value of number of lanes. In addition, the improved performance of CPN over NCPN reaches peak when the average number of neighbors approaches that number in the trigger. & 2013 Elsevier Ltd. All rights reserved.
منابع مشابه
An Effective Scheme for Location Privacy in VANETs
Location privacy is an important concern in VANETs(Vehicular Ad hoc Networks). Anonymity is one of commonly adopted solution to protect location privacy. In this paper, we present a mechanism based on an ID-based cryptosystem in order to ensure vehicles’ anonymity by pseudonyms. In this mechanism, we adopt Pseudonyms Synchronously Change ( PSC ) scheme, which improves anonymity. In the schemes,...
متن کاملProtocol Change Pseudonyms (PCP) for VANETs
Vehicle Ad-Hoc Network (VANET) is an advance wireless technology in the field of wireless communication, communicate for safety and comfort purpose. Many types of technology and application are being developed for VANET. The security protocols based on periodic change pseudonyms. The illegal traceability of vehicles during their communications avoid the idea and approach is the central authorit...
متن کاملEfficient authentication and access control of message dissemination over vehicular ad hoc network
Recently, security and privacy have been one of the main concerns that impedes the development of vehicular ad hoc networks (VANETs). In this paper, we put forward an access control with authentication scheme for disseminated messages in VANETs. In the scheme, we integrate pseudonym with identity based signature (IBS) which could not only authenticate the messages in vehicular communication, bu...
متن کاملRouting Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms
are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...
متن کاملProtecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change
Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with roadside units, these pseudonyms are used to authenticate these vehicles and to hide real identities behind these pseudonyms, to better enhance privacy, these pseudonyms are changed frequently so that it will not be that easy to link these pseudonyms together and hence reveal real identities. However, changing ps...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 36 شماره
صفحات -
تاریخ انتشار 2013