Privacy in VANETs using Changing Pseudonyms - Ideal and Real
- 1 April 2007
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
- No. 15502252,p. 2521-2525
- https://doi.org/10.1109/vetecs.2007.519
Abstract
Vehicular ad hoc networks (VANETs) and vehicular communications are considered a milestone in improving the safety, efficiency and convenience in transportation. Vehicular ad hoc networks and many vehicular applications rely on periodic broadcast of the vehicles' location. For example, the location of vehicles can be used for detecting and avoiding collisions or geographical routing of data to disseminate warning messages. At the same time, this information can be used to track the users' whereabouts. Protecting the location privacy of the users of VANETs is important, because lack of privacy may hinder the broad acceptance of this technology. Frequently changing pseudonyms are commonly accepted as a solution to protect the privacy in VANETs. In this paper, we discuss their effectiveness and different methods to change pseudonyms. We introduce the context mix model that can be used to describe pseudonym change algorithms. Further, we asses in which situations, i.e. mix contexts, a pseudonym change is most effective and improves the privacy in vehicular environments.Keywords
This publication has 8 references indexed in Scilit:
- Balancing auditability and privacy in vehicular networksPublished by Association for Computing Machinery (ACM) ,2005
- An integrated mobility and traffic model for vehicular wireless networksPublished by Association for Computing Machinery (ACM) ,2005
- On the Anonymity of Periodic Location SamplesLecture Notes in Computer Science, 2005
- Detecting and correcting malicious data in VANETsPublished by Association for Computing Machinery (ACM) ,2004
- The security and privacy of smart vehiclesIEEE Security & Privacy, 2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- Position-based routing in ad hoc networksIEEE Communications Magazine, 2002