Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication

被引:7
|
作者
Didouh, Ahmed [1 ]
El Hillali, Yassin [1 ]
Rivenq, Atika [1 ]
Labiod, Houda [2 ]
机构
[1] Polytech Univ Hauts De France, IEMN DOAE, CNRS, UMR 8520, F-59300 Valenciennes, France
[2] INFRES Comp & Networks ENST, Telecom, F-91120 Paris, France
关键词
privacy measurement in V2X wireless communications; adapted pseudonym change scheme; authorization authority backup;
D O I
10.3390/en15030692
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Vehicular ad hoc networks allow vehicles to share their information for the safety and efficiency of traffic purposes. However, information sharing can threaten the driver's privacy as it includes spatiotemporal information, and the messages are unencrypted and broadcasted periodically. Therefore, they cannot estimate their privacy level because it also depends on their surroundings. This article proposes a centralized adaptive pseudonym change scheme that permits the certificate's authority to adjust the pseudonyms assignment for each requesting vehicle. This scheme adapts dynamically depending on the density of the traffic environment and the user's privacy level, and it aims to solve the trade-off problem between wasting pseudonyms and Sybil attack. We employ a Knapsack problem-based algorithm for target tracking and an entropy-based method to measure each vehicle's privacy. In order to demonstrate the applicability of our framework, we use real-life data captured during the interoperability tests of the European project InterCor. According to the experimental results, the proposed scheme could easily estimate the level of confidentiality and, therefore, may best respond to the adaptation of the pseudonyms.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Joint Distributed and Centralized Resource Scheduling for D2D-based V2X Communication
    Li, Xiaoshuai
    Ma, Lin
    Xu, Yubin
    Shankaran, Rajan
    Orgun, Mehmet
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [32] An Effective Strategy for Pseudonym Generation & Changing Scheme with Privacy Preservation for VANET
    Mathews, Sam M.
    Jinila, Bevish Y.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [33] V2X Resource Allocation Scheme Based on D2D Communication
    Zhang H.-B.
    Xiang Y.
    Liu K.-J.
    Chen S.-X.
    2017, Beijing University of Posts and Telecommunications (40): : 92 - 97
  • [34] Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles
    Cai, Zekun
    Xiong, Aiping
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2975 - 2992
  • [35] POSTER: Separation of Activation Code Delivery on V2X Pseudonym Certificate Revocation
    Wantoro, Jan
    Mambo, Masahiro
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 219 - 222
  • [36] SLOW-Based Pseudonym Changing Schemes for Location Privacy in Vehicular Networks
    Lomas, Mateo Sebastian
    Paspuel, Robinson
    Iza, Cristhian
    Igartua, Monica Aguilar
    PROCEEDINGS OF THE INT'L ACM CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, MSWIM 2023, 2023, : 165 - 173
  • [37] Fuzzy Logic Based Binary Computation Offloading Scheme in V2X Communication Networks
    Men, Rui
    Fan, Xiumei
    Shan, Axida
    Yuan, Gang
    IEEE ACCESS, 2024, 12 : 45507 - 45518
  • [38] Fuzzy Logic Based Binary Computation Offloading Scheme in V2X Communication Networks
    Men, Rui
    Fan, Xiumei
    Shan, Axida
    Yuan, Gang
    IEEE Access, 2024, 12 : 45507 - 45518
  • [39] On Handling of Certificate Digest in V2X Communication
    Yoshizawa, Takahito
    Preneel, Bart
    2022 18TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2022,
  • [40] Network emulator for V2X communication systems
    Gonzalez-Plaza, Ana
    Briso-Rodriguez, Cesar
    Gutierrez-Cantarero, Rafael
    2019 13TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2019,