skip to main content
10.1145/2069105.2069109acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Privacy preserving neighborhood awareness in vehicular ad hoc networks

Published:31 October 2011Publication History

ABSTRACT

Location information is exchanged among members of Vehicular Ad Hoc Networks (VANET) to serve many road and safety applications. Vehicles will announce their identity, position, and mobility information to their neighboring nodes. The importance of such information makes privacy a major concern. Successful implementation of VANET requires protecting the vehicle's identity at all times and preventing attackers from tracking vehicles and building traveling profiles of other users. The authorities, on the other hand, should be permitted to track certain subjects for non-repudiation and accountability purposes. Researchers have discussed privacy in VANET and have proposed different solutions to protect users' identities, such as using digital signatures. However, there is still a risk that profile building can be done by an attacker using a compromised vehicle. In this paper, we will describe the security threat and propose a solution to protect the user's privacy by eliminating the use of vehicle IDs in beacon messages and secure information handling.

References

  1. O. Abumansoor and A. Bouckerche. A cooperative multi-hop location verification for Non Line of Sight (NLOS) in VANET. In IEEE Wireless Communications and Networking Conference, WCNC, pages 773--778, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro. Vehicular Ad Hoc Networks: A new challenge for localization-based systems. Computer Communications, 31(12):2838--2849, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Chaurasia, S. Verma, and S. Bhasker. Message broadcast in VANETs using group signature. In 4th International Conference on Wireless Communication and Sensor Networks, WCSN, pages 131--136, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Guo, J. Baugh, and S. Wang. A group signature based secure and privacy-preserving vehicular communication framework. In 2007 Mobile Networking for Vehicular Environments, pages 103--108, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  5. IEEE1609.2. Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. IEEE, 2006.Google ScholarGoogle Scholar
  6. X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen. Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4):88--95, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. X. Lin, X. Sun, P. Ho, and X. Shen. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transaction on Vehicular Technology, 56(6):3442--3456, November 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux. Secure vehicular communication systems: design and architecture. IEEE Communication Magazine, 46(11):100--109, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Parker and S. Valaee. Vehicular node localization using received-signal-strength indicator. IEEE Transactions on Vehicular Technology, 56(6):3371--3380, November 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. M. Rabadi and S. Mahmud. Privacy protection among drivers in vehicle-to-vehicle communication networks. In IEEE 4th Consumer Communications and Networking Conference, CCNC'07, pages 281--286, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, IOS Press, 15(1):39--68, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Sun, C. Zhang, Y. Zhang, and Y. Fang. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9):1227--1239, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. In The 27th Conference on Computer Communications, INFOCOM'08, pages 246--250, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  1. Privacy preserving neighborhood awareness in vehicular ad hoc networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Q2SWinet '11: Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
        October 2011
        80 pages
        ISBN:9781450308991
        DOI:10.1145/2069105

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 October 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate46of131submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader