期刊文献+

A Scalable Privacy Preserving Scheme in Vehicular Network 被引量:1

A Scalable Privacy Preserving Scheme in Vehicular Network
下载PDF
导出
摘要 Vehicles enlisted with computing, sensing and communicating devices can create vehicular networks, a subset of cooperative systems in heterogeneous environments, aiming at improving safety and entertainment in traffic. In vehicular networks, a vehicle's identity is associated to its owner's identity as a unique linkage. Therefore, it is of importance to protect privacy of vehicles from being possibly tracked. Obviously, the privacy protection must be scalable because of the high mobility and large population of vehicles. In this work, we take a non-trivial step towards protecting privacy of vehicles. As privacy draws public concerns, we firstly present privacy implications of operational challenges from the public policy perspective. Additionally, we envision vehicular networks as geographically partitioned subnetworks (cells). Each subnetwork maintains a list of pseudonyms. Each pseudonym includes the cell's geographic id and a random number as host id. Before starting communication, vehicles need to request a pseudonym on demand from pseudonym server. In order to improve utilization of pseudonyms, we address a stochastic model with time-varying arrival and departure rates. Our main contribution includes: 1) proposing a scalable and effective algorithm to protect privacy; 2) providing analytical results of probability, variance and expected number of requests on pseudonym servers. The empirical results confirm the accuracy of our analytical predictions. Vehicles enlisted with computing, sensing and communicating devices can create vehicular networks, a subset of cooperative systems in heterogeneous environments, aiming at improving safety and entertainment in traffic. In vehicular networks, a vehicle's identity is associated to its owner's identity as a unique linkage. Therefore, it is of importance to protect privacy of vehicles from being possibly tracked. Obviously, the privacy protection must be scalable because of the high mobility and large population of vehicles. In this work, we take a non-trivial step towards protecting privacy of vehicles. As privacy draws public concerns, we firstly present privacy implications of operational challenges from the public policy perspective. Additionally, we envision vehicular networks as geographically partitioned subnetworks (cells). Each subnetwork maintains a list of pseudonyms. Each pseudonym includes the cell's geographic id and a random number as host id. Before starting communication, vehicles need to request a pseudonym on demand from pseudonym server. In order to improve utilization of pseudonyms, we address a stochastic model with time-varying arrival and departure rates. Our main contribution includes: 1) proposing a scalable and effective algorithm to protect privacy; 2) providing analytical results of probability, variance and expected number of requests on pseudonym servers. The empirical results confirm the accuracy of our analytical predictions.
出处 《Computer Aided Drafting,Design and Manufacturing》 2014年第1期64-73,共10页 计算机辅助绘图设计与制造(英文版)
关键词 PRIVACY vehicular ad hoc networks analytical prediction privacy, vehicular ad hoc networks, analytical prediction
  • 相关文献

参考文献24

  • 1Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang. Enforcing privacy using symmetric random key-set in vehicular networks [C]//Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, 2007, pp. 344-351.
  • 2Y. Sun, X. Su, B. Zhao, and J. Su. Mix-zones deployment for location privacy preservation in vehicular communications [C]// 10th IEEE International Conference on Computer and Information Technology (CIT 2010), West Yorkshire, UK, June 29-July 1 2010: 2825-2830.
  • 3B. Palanisamy and L. Liu. Mobimix: Protecting location privacy with mix-zones over road networks [C]// Proceedings of the 27th International Conference on Data Engineering (ICDE 2011), Hannover, Germany, April 11-162011: 494-505.
  • 4Car 2 Car Communication Consortium[EB/OL]. http://www.car-to-car.org/.
  • 5H. Kazuhiro. Far infrared vehicle detector [J]. Kyosan Circular, (Kyosan Electr. Mfg. Co .. Ltd., JPN). 2007, 58(1): 6-11.
  • 6A. Studer, E. Shi, F. Bai, and A. Perrigo Tacking together efficient authentication, revocation, and privacy in vanets [C]// Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, ser. SECON'09, 2009, pp. 484-492.
  • 7H.Ook, H. Fu, R. Echevarria, and H. Weerasinghe. Privacy issues of vehicular ad-hoc networks [J]. International Journal of Future Generation Communication and Networking, 2010, 3(1): 17-32.
  • 8B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols [J]. Journal of Logic and Algebraic Programming, 2008,75(1): 3-51.
  • 9G. Van, S. Olariu, J. Wang, and S. Arif. Towards providing scalable and robust privacy in vehicular networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 99( PrePrints).
  • 10J. Song, V. W. S. Wong, and V. C. M. Leung. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks [J]. Mobile Networks and Applications, 2009, 15(1): 160-171.

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部