A Privacy Conserves Pseudonym Acquisition Scheme in Vehicular Communication Systems

被引:6
|
作者
Haider, Sheraz [1 ]
Gao, Deyun [1 ]
Ali, Rehan [2 ]
Hussain, Arif [3 ]
Ikram, Muhammad Talha [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Natl Engn Lab Next Generat Internet Interconnect, Beijing 100044, Peoples R China
[2] Iqra Univ, Dept Comp & Technol, Islamabad Campus, Islamabad 44000, Pakistan
[3] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
关键词
Privacy; Roads; Principal component analysis; Vehicular ad hoc networks; Safety; Internet; Vehicles; pseudonym changing; location privacy; tracking; LOCATION PRIVACY;
D O I
10.1109/TITS.2022.3141744
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Vehicular communication systems rely on temporary anonymous identities, i.e., pseudonyms, to avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary can easily follow the vehicle by observing and linking messages signed under that pseudonym. Therefore, the vehicles acquire a set of pseudonyms from the Pseudonym Certificate Authority. If a vehicle would be unable to obtain these pseudonyms because of the bad communication and delay in processing from the roadside unit, it would not utilize the communication system without compromising the privacy of location. Hence, security and privacy techniques proposed for conventional vehicular ad-hoc network's pseudonym-changing strategy may not scale well in such early deployed scenarios. This paper addresses the above-mentioned problem by offering a secure pseudonym scheme. Under this scheme, a vehicle can generate its pseudonyms using Gao Algorithm. Pseudonym Certificate Authority (PCA) issues one pseudonym for one vehicle that is sent to vehicles after encryption. The Gao Algorithm automatically generates sub-pseudonyms that are useable for 10 days. Consequently, the PCA requires less memory while providing maximum location confidentiality, and there is almost no complexity in managing pseudonyms. The Gao Algorithm uses encrypted identities so that only the central server knows the real identities of vehicles. We conduct simulations to verify the performance of the Gao Algorithm. Results show that the Gao Algorithm is expressively better than current strategies. Besides, even in the absence of roadside unit connections and low traffic on the road, the Gao Algorithm can achieve promising performance.
引用
收藏
页码:15536 / 15545
页数:10
相关论文
共 50 条
  • [1] Blockchain-Based Pseudonym Management Scheme for Vehicular Communication
    George, Sonia Alice
    Stephen, Steffie Maria
    Jaekel, Arunita
    [J]. ELECTRONICS, 2021, 10 (13)
  • [2] PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks
    Foerster, David
    Kargl, Frank
    Loehr, Hans
    [J]. AD HOC NETWORKS, 2016, 37 : 122 - 132
  • [3] Efficient communication scheme with confidentiality and privacy for vehicular networks
    Xiong, Hu
    Zhu, Guobin
    Chen, Zhong
    Li, Fagen
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (06) : 1717 - 1725
  • [4] Privacy Preserving Scheme for Pseudonym Refilling in VANET
    Benarous, Leila
    Kadri, Benamar
    [J]. 2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 114 - 119
  • [5] An Efficient Pseudonymous Generation Scheme with Privacy Preservation for Vehicular Communication
    Mathews, Sam M.
    Vijayashanthi, N.
    Sundhari, A.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 109 - 113
  • [6] LDPC Code based Pseudonym Scheme for Vehicular Networks
    Zhou, Jin
    Zheng, Changsong
    Li, Yuedi
    Xu, Hua
    Qin, Zhiguang
    Chen, Dajiang
    [J]. 2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 87 - 92
  • [7] Security on Wheels: Security and Privacy for Vehicular Communication Systems
    Papadimitratos, Panos
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1855 - 1856
  • [8] A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan H.
    [J]. SENSORS, 2022, 22 (05)
  • [9] An Effective Pseudonym Generating Scheme for Privacy and Anonymity in VANETs
    Wang, Lingling
    Liu, Guozhu
    Sun, Lijun
    Lin, Yuewei
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI 2016), 2016, : 267 - 270
  • [10] Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication
    Didouh, Ahmed
    El Hillali, Yassin
    Rivenq, Atika
    Labiod, Houda
    [J]. ENERGIES, 2022, 15 (03)