Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks

被引:5
|
作者
Farman, Haleem [1 ]
Jan, Bilal [2 ]
Talha, Muhammad [3 ]
Zar, Abi [4 ]
Javed, Huma [5 ]
Khan, Murad [6 ]
Din, Aziz Ud [7 ]
Han, Kijun [8 ]
机构
[1] Islamia Coll Peshawar, Dept Comp Sci, Peshawar, Pakistan
[2] FATA Univ, Dept Comp Sci, Fr Kohat, Pakistan
[3] King Saud Univ, Deanship Sci Res, Riyadh, Saudi Arabia
[4] Univ Malaysia Sarawak, Fac Comp Sci & IT, Kota Samarahan, Malaysia
[5] Univ Peshawar, Dept Comp Sci, Peshawar, Pakistan
[6] Sarhad Univ Sci & IT, Dept Comp Sci & IT, Peshawar, Pakistan
[7] Univ Peshawar, Shiekh Zayed Islamic Ctr, Peshawar, Pakistan
[8] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
基金
新加坡国家研究基金会;
关键词
SECURE; PROTOCOL;
D O I
10.1155/2018/7697324
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Vehicular ad hoc networks (VANETs) are the preferable choice for Intelligent Transportation Systems (ITS) because of its prevailing significance in both safety and nonsafety applications. Information dissemination in a multihop fashion along with privacy preservation of source node is a serious but challenging issue. We have used the idea of the phantom node as the next forwarder for data dissemination. The phantom node (vehicle) hides the identity of actual source node thus preserving the location privacy. The selection of the phantom node among the set of alternatives' candidate vehicles is considered as a multicriteria-based problem. The phantom node selection problem is solved by using an analytical network process (ANP) by considering different traffic scenarios. The selection is based on different parameters which are distance, speed, trust, acceleration, and direction. The best alternative (target phantom vehicle) is selected through an ANP where all the alternatives are ranked from best to worst. The vehicle having maximum weight is considered to be the best choice as a phantom node. In order to check the stability of the alternatives' ranking, sensitivity analysis is performed by taking into account different traffic scenarios and interest level of candidate vehicles.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Location-based message aggregation in Vehicular Ad Hoc Networks
    Saleet, Hanan
    Basir, Otman
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 18 - +
  • [22] Decentralized proof of location in vehicular Ad Hoc networks
    Boeira, Felipe
    Asplund, Mikael
    Barcellos, Marinho
    COMPUTER COMMUNICATIONS, 2019, 147 : 98 - 110
  • [23] PROVIDING LOCATION SECURITY IN VEHICULAR AD HOC NETWORKS
    Yan, Gongjun
    Olariu, Stephan
    Weigle, Michele C.
    IEEE WIRELESS COMMUNICATIONS, 2009, 16 (06) : 48 - 53
  • [24] Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation
    Choi, Hyoung-Kee
    Kim, In-Hwan
    Yoo, Jae-Chern
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [25] Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation
    Hyoung-Kee Choi
    In-Hwan Kim
    Jae-Chern Yoo
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [26] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Chaudhary, Bhawna
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3198 - 3212
  • [27] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Bhawna Chaudhary
    Karan Singh
    Peer-to-Peer Networking and Applications, 2021, 14 : 3198 - 3212
  • [28] Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
    Li, Longjiang
    Mao, Yuming
    Li, Yonggang
    Yuan, Yinxia
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) : 2349 - 2359
  • [29] Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
    Longjiang Li
    Yuming Mao
    Yonggang Li
    Yinxia Yuan
    Wireless Personal Communications, 2013, 71 : 2349 - 2359
  • [30] On Joint Privacy and Reputation Assurance for Vehicular Ad Hoc Networks
    Li, Zhengming
    Chigan, Chunxiao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (10) : 2334 - 2344