Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles
<p>V2X communication.</p> "> Figure 2
<p>System models.</p> "> Figure 3
<p>Adversary model.</p> "> Figure 4
<p>Average percentage of traceability in sparse to dense traffic scenario.</p> "> Figure 5
<p>Average percentage of normalized traceability in sparse to dense traffic scenario.</p> "> Figure 6
<p>Pseudonym consumption.</p> "> Figure 7
<p>BSM packet loss rate.</p> "> Figure 8
<p>Average confusion for adversary according to pseudonym change.</p> "> Figure 9
<p>Proportion of vehicles that changed their pseudonym.</p> ">
Abstract
:1. Introduction
- (1)
- We explore the literature on pseudonym-based anonymity assurance for messaging in the IoVs.
- (2)
- Next, we propose a solution to estimate the next state of vehicles and their speed and direction before sending the pseudonym-changing alert.
- (3)
- We also deal with the exchange of pseudonyms to reduce costs and ensure anonymity as well.
- (4)
- Finally, simulations are performed to validate the results where the proposed scheme outperforms in contrast to three dominating schemes.
2. Literature Review
2.1. Mix-Context-Based Schemes
2.2. Mix-Zone-Based Schemes
3. System Model and Problem Statement
- (1)
- The TA is used to allocate pseudonyms to vehicles when they enter the network. In case a vehicle is conducting suspicious activities in the network, after receiving the report from the RSU, the TA revokes the pseudonym of that vehicle. So, the main purpose of this entity is to allocate, revoke and keep the link between former and new pseudonyms.
- (2)
- Vehicles are the basic components of the system model, which is equipped with the OBU, GPS and sensors. The vehicles can communicate with each other and the RSU for sharing safety beacons, and share pseudonym information and other information. During traveling on roads, vehicles need to know accurate information about their destination.
- (3)
- The location-based server provides the following facilities: i) inquiring about vehicle appeal to the RSU, ii) sends a request to the location-based server (LBS) for providing accurate location information for moving to the desired destination.
- (4)
- The RSU monitors traffic and informs vehicles about it in a timely manner. In this case, the pseudonyms are insufficient, and the RSU requests the TA to provide more numbers. In the case of malicious nodes in the network, the RSU instructs the TA to revoke its pseudonym. The system model of the proposed scheme is shown in Figure 2.
Adversary Model
4. Efficient Pseudonym Consumption Protocol
Algorithm 1: Efficient Pseudonym Consumption Algorithm |
//When intended vehicle v get BSM 1. N_position = BSM.pos (); 2. Neigh_dis = dis(my_position, N_position) 3. If (Neigh_dis ≤ T) then 4. Neigh_v++ 5. store ← store + Neigh_v; 6. Else drop BSM. 7. End if //intended vehicle v aims to disseminate BSM in upcoming timeslot 8. while (OBU status is active) do 9. wait (beacon interval) 10. Ready (BSM); 11. if (nodes ≥ k) then 12. vehicles_trails ← kalman_filter(store); 13. for i ← 1 to Neigh_v do 14. if (Euclidean (vehicles_trails(i).pos, current_state.pos) ≤ Close_R) then 15. adjacent ← adjacent + vehicles_trails(i); 16. End if 17. End for 18. if (!adjacent.empty()) then 19. Call Function Neighbor_speed ← BSM.speed() 20. if (Neighbor_speed < thresholdmin) OR (Neighbor_speed > thresholdmax) then 21. Call Function BSM (Delay) 22. Else 23. N_direction = Call Function BSM_direction () 24. if (std:: equal(mine_direction, N_direction)) then 25. if (Neigh_v ≥ threshold &&((Neigh_v (Readyflag) && v_readyflag == 1)) then 26. Call Function Update cooperatively pseudonym () 27. Set Readyflag_bit to 0 28. elseif (Neigh_v < threshold && ((Neigh_v (Readyflag) && v_readyflag == 1)) 29. Random exchange of unused pseudonym (Vi, Vj) 30. Set Readyflag_bit to 0 31. End if 32. End if 33. End if 34. If (adjacent.empty()) then 35. Locality ← False //no vehicle is in transmission range of vehicle v 36. End if 37. If (v_pseudolife > stable_span) then 38. Call Function Update pseudonym (); 39. Set Readyflag_bit to 0 40. End if 41.End if 42.End while |
5. Results and Discussion
5.1. Average Percentage of Adversary Attains Traceability
5.2. Average Percentage of Adversary Attains Normalized Traceability
5.3. Pseudonym Consumption
5.4. BSM Loss Rate
5.5. Average Confusion for Attacker Due to Change in Pseudonym
5.6. Proportion of Vehicles That Changed Pseudonym
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Fadhil, J.A.; Sarhan, Q.I. Internet of Vehicles (IoV): A Survey of Challenges and Solutions. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; pp. 1–10. [Google Scholar] [CrossRef]
- Sharma, S.; Kaushik, B. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 2019, 20, 100182. [Google Scholar] [CrossRef]
- Hasan, M.; Mohan, S.; Shimizu, T.; Lu, H. Securing vehicle-to-everything (V2X) communication platforms. IEEE Trans. Intell. Veh. 2020, 4, 693–713. [Google Scholar] [CrossRef]
- Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
- Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the Internet of Vehicles: Network Architectures and Applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
- Khan, M.Z.; Alhazmi, O.H.; Javed, M.A.; Ghandorh, H.; Aloufi, K.S. Reliable internet of things: Challenges and future trends. Electronics 2021, 10, 2377. [Google Scholar] [CrossRef]
- Lin, K.; Li, C.; Li, Y.; Savaglio, C.; Fortino, G. Distributed learning for vehicle routing decision in software defined Internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3730–3741. [Google Scholar] [CrossRef]
- Talat, H.; Nomani, T.; Mohsin, M.; Sattar, S. A Survey on Location Privacy Techniques Deployed in Vehicular Networks. In Proceedings of the 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 8–12 January 2019; Volume 13, pp. 604–613. [Google Scholar] [CrossRef]
- Garg, T.; Kagalwalla, N.; Churi, P.; Pawar, A.; Deshmukh, S. A survey on security and privacy issues in IoV. Int. J. Electr. Comput. Eng. 2020, 10, 5409–5419. [Google Scholar] [CrossRef]
- Wang, J.; Shao, Y.; Ge, Y.; Yu, R. A survey of vehicle to everything (V2X) testing. Sensors 2019, 19, 334. [Google Scholar] [CrossRef]
- Talib, M.S.; Hassan, A.; Hussin, B.; Hassan, A.A.H. Vehicular Ad-hoc networks: Current challenges and future direction of research. J. Adv. Res. Dyn. Control Syst. 2018, 10, 2065–2074. [Google Scholar]
- Ferrag, M.A.; Maglaras, L.; Ahmim, A. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey. IEEE Commun. Surv. Tutor. 2017, 19, 3015–3045. [Google Scholar] [CrossRef]
- Afzal, Z.; Kumar, M. Security of Vehicular Ad-Hoc Networks (VANET): A survey. J. Phys. Conf. Ser. 2020, 1427, 012015. [Google Scholar] [CrossRef]
- Pan, Y.; Li, J. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 2013, 36, 1599–1609. [Google Scholar] [CrossRef]
- Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Ferrag, M.A.; Maglaras, L.; Janicke, H. Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles. Sensors 2021, 21, 2443. [Google Scholar] [CrossRef] [PubMed]
- Li, X.; Zhang, H.; Ren, Y.; Ma, S.; Luo, B.; Weng, J.; Ma, J.; Huang, X. PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 2020, 7, 11789–11802. [Google Scholar] [CrossRef]
- Zidani, F.; Semchedine, F.; Ayaida, M. Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. Comput. Electr. Eng. 2018, 71, 359–371. [Google Scholar] [CrossRef]
- Singh, P.K.; Gowtham, S.N.; Tamilselvan, S.; Nandi, S. CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs. Veh. Commun. 2019, 20, 100183. [Google Scholar] [CrossRef]
- Bouksani, W.; Bensaber, B.A. RIN: A dynamic pseudonym change system for privacy in VANET. Concurr. Comput. Pract. Exp. 2019, 31, 1–13. [Google Scholar] [CrossRef]
- Emara, K.; Woerndl, W.; Schlichter, J. Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks. arXiv 2016, arXiv:1607.07656. [Google Scholar]
- Ullah, I.; Shah, M.A.; Khan, A.; Maple, C.; Waheed, A. Virtual pseudonym-changing and dynamic grouping policy for privacy preservation in vanets. Sensors 2021, 21, 3077. [Google Scholar] [CrossRef]
- Ullah, I.; Shah, M.A.; Khan, A.; Maple, C.; Waheed, A.; Jeon, G. A distributed mix-context-based method for location privacy in road networks. Sustainability 2021, 13, 12513. [Google Scholar] [CrossRef]
- Ullah, I.; Shah, M.A.; Khan, A. Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs. In Proceedings of the 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Orlando, FL, USA, 5–7 December 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Wahid, A.; Yasmeen, H.; Shah, M.A.; Alam, M.; Shah, S.C. Holistic approach for coupling privacy with safety in VANETs. Comput. Netw. 2019, 148, 214–230. [Google Scholar] [CrossRef]
- Yang, M.; Feng, Y.; Fu, X.; Qian, Q. Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles. Int. J. Distrib. Sens. Netw. 2019, 15, 1–16. [Google Scholar] [CrossRef]
- Zhang, Z.; Feng, T.; Sikdar, B.; Wong, W.C. A Flickering Context-based Mix Strategy for Privacy Protection in VANETs. In Proceedings of the IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Weerasinghe, H.; Fu, H.; Leng, S.; Zhu, Y. Enhancing unlinkability in vehicular ad hoc networks. In Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, ISI, Beijing, China, 10–12 July 2011; pp. 161–166. [Google Scholar] [CrossRef]
- Emara, K.; Woerndl, W.; Schlichter, J. CAPS: Context-aware privacy scheme for VANET safety applications. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec, New York, NY, USA, 22–26 June 2015; pp. 1–12. [Google Scholar] [CrossRef]
- Li, Y.; Yin, Y.; Chen, X.; Wan, J.; Jia, G.; Sha, K. A Secure Dynamic Mix Zone Pseudonym Changing Scheme Based on Traffic Context Prediction. IEEE Trans. Intell. Transp. Syst. 2021, 23, 9492–9505. [Google Scholar] [CrossRef]
- Ying, B.; Makrakis, D.; Mouftah, H.T. Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 2013, 17, 1524–1527. [Google Scholar] [CrossRef]
- Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 2012, 61, 86–96. [Google Scholar] [CrossRef]
- Xu, X.; Huang, Q.; Zhu, H.; Sharma, S.; Zhang, X.; Qi, L.; Bhuiyan, M.Z.A. Secure service offloading for internet of vehicles inSDN-enabled mobile edge computing. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3720–3729. [Google Scholar] [CrossRef]
- Shaleesh, I.; Almohammedi, A.; Mohammad, N.; Ahmad, A.; Shepelev, V. Cooperation and radio silence strategy in Mix Zone to Protect Location Privacy of Vehicle in VANET. Tikrit J. Eng. Sci. 2021, 28, 31–39. [Google Scholar] [CrossRef]
- Ying, B.; Makrakis, D. Reputation-based Pseudonym Change for Location Privacy in vehicular networks. IEEE Int. Conf. Commun. 2015, 10, 7041–7046. [Google Scholar] [CrossRef]
- Boualouache, A.; Senouci, S.M.; Moussaoui, S. Towards an efficient pseudonym management and changing scheme for vehicular ad-hoc networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar] [CrossRef]
- Ullah, I.; Wahid, A.; Shah, M.A.; Waheed, A. VBPC: Velocity Based Pseudonym Changing Strategy to Protect Location Privacy of Vehicles in VANET. In Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017; pp. 132–137. [Google Scholar]
- Emara, K. Poster: PREXT: Privacy extension for Veins VANET simulator. In Proceedings of the IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 3–5. [Google Scholar] [CrossRef]
- Sommer, C.; Eckhoff, D.; Brummer, A.; Buse, D.S.; Hagenauer, F.; Joerer, S.; Segata, M. Veins: The Open Source Vehicular Network Simulation Framework; Springer: Berlin/Heidelberg, Germany, 2019; ISBN 9783030128425. [Google Scholar]
- Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the SIMUTools 2008—1st International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems, Marseille, France, 3–7 March 2008. [Google Scholar] [CrossRef]
- Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
Sr. | Notation | Description |
---|---|---|
1. | Number of neighbors | |
2. | Neigh_dis | Neighbor distance |
3. | Neigh_v | Vehicles in locality of vehicle v |
4. | thresholdmin | Minimum threshold speed |
5. | threshold | Neighbor threshold value |
6. | Vi | Vehicle v |
7. | Vj | Neighboring vehicles |
8. | thresholdmax | Maximum threshold speed |
9. | Close_R | Close range |
10. | N_direction | Direction of neighbor vehicles |
Parameters | Values |
---|---|
Simulation time | 300 s |
Number of vehicles | 50, 100, 150, 200 |
Transmission range | 300 m |
Pseudonym stable time | 50 s |
Minimum speed threshold | 5 m/s |
Maximum speed threshold | 30 m/s |
Close range | 100 m |
Neighbor threshold | 40 |
Operating system | Ubuntu 16.04 |
Coupling protocol | TraCi |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mushtaq, M.; Ullah, A.; Ashraf, H.; Jhanjhi, N.Z.; Masud, M.; Alqhatani, A.; Alnfiai, M.M. Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles. Sensors 2023, 23, 5217. https://doi.org/10.3390/s23115217
Mushtaq M, Ullah A, Ashraf H, Jhanjhi NZ, Masud M, Alqhatani A, Alnfiai MM. Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles. Sensors. 2023; 23(11):5217. https://doi.org/10.3390/s23115217
Chicago/Turabian StyleMushtaq, Mehreen, Ata Ullah, Humaira Ashraf, N.Z Jhanjhi, Mehedi Masud, Abdulmajeed Alqhatani, and Mrim M. Alnfiai. 2023. "Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles" Sensors 23, no. 11: 5217. https://doi.org/10.3390/s23115217
APA StyleMushtaq, M., Ullah, A., Ashraf, H., Jhanjhi, N. Z., Masud, M., Alqhatani, A., & Alnfiai, M. M. (2023). Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles. Sensors, 23(11), 5217. https://doi.org/10.3390/s23115217