Wireless Personal Communications

, Volume 97, Issue 3, pp 3645–3671 | Cite as

RETRACTED ARTICLE: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks

  • Qasim Ali Arain
  • ZhongLiang Deng
  • Imran MemonEmail author
  • Asma Zubedi
  • Farman Ali Mangi


According to the recent studies, application related with safety associated with road networks must need verification of entities and messages. However, security of road network users like vehicles and drivers needs to be dealt with. Unique identity like pen names and certificates might get useful to ensure security. Pseudonym names and the special certificates are being considered as the basic building blocks to ensure security requirements for road networks. Nevertheless, apart from the seen advantages, road network communication might also generate certain privacy issues by giving opportunity to invader to track vehicles. One and for most basic technique is to solve this issue by means of using pen names by the vehicles and alter them time to time. Since executing the procedure of changing pen names has to increase overhead. By looking at such type of limitations, our given technique will produce top privacy level for the road network users by using dynamic pseudonyms based multiple mix zones scenario. This pseudonym based procedure will base upon vehicle’s acceleration, heading and displacement to execute dynamic pseudonym alteration. We have performed simulation by applying SUMO simulator. After having a detailed comparison with the current pseudonym change techniques, it has been verified that our given technique has shown enhanced performance in terms of acquiring top level privacy rate having few numbers of pseudonyms alteration; broad level of simulations and analysis has been elaborated the efficiency of the given technique.


Location privacy Road network Multiple mix-zones 



This research has been funded by The National High Technology Research and Development Program of China (NO.2014AA123103, NO.2015AA124103) and National Natural Science Foundation of China (NO. 61401040, NO. 61372110).

Compliance with ethical standards

Competing interests

The author(s) declare that there is no conflict of interest regarding the publication of this manuscript.


  1. 1.
    Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRefGoogle Scholar
  2. 2.
    Memon, I. (2015). A Secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRefGoogle Scholar
  3. 3.
    Beresford, A., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1), 46–55.CrossRefGoogle Scholar
  4. 4.
    Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., & Fang, Y. (2012). Traffic-aware multiple mix zone placement for protecting location privacy. In Proceedings of the IEEE INFOCOM (pp. 972–980).Google Scholar
  5. 5.
    Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communications, 79(1), 647–660.Google Scholar
  6. 6.
    Pan, Y., & Li, J. (2013). Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36, 1599–1609.CrossRefGoogle Scholar
  7. 7.
    Guo, S., Zeng, D., & Yang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803. doi: 10.1109/TPDS.2013.277 CrossRefGoogle Scholar
  8. 8.
    Memon, I., & Arain, Q. A. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639–672.CrossRefGoogle Scholar
  9. 9.
    Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., Unar, M. A., Ashraf, A., & Shaikh, R. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–521. doi: 10.1007/s11277-016-3906-4.
  10. 10.
    Buttyán, L., Holczer, T., Weimerskirch, A., & Whyte, W. (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In IEEE vehicular networking conference (pp. 1–8).Google Scholar
  11. 11.
    Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. S. (2012). Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions Vehicular Technology, 61(1), 86–96.CrossRefGoogle Scholar
  12. 12.
    Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). Efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 1–20. doi: 10.1007/s11277-017-4022-9.
  13. 13.
    Arain, Q. A., Deng, Z., Memon, I., Zubedi, A., & Mangi, F. A. (2017). Map services based on multiple mix-zones with location privacy protection over road network. Wireless Personal Communications, 1–16. doi: 10.1007/s11277-017-4626-0.
  14. 14.
    Akhtar, R., Amin, N. U., Memon, I., & Shah, M. (2012). Implementation of secure AODV in MANET. In International conference on graphic and image processing (pp. 876803–876803).Google Scholar
  15. 15.
    Shiode, N., Li, C., Batty, M., Longley, P., & Maguire, D. (2002). The impact and penetration of location-based services. CASA Working Paper 50. Accessed June 23, 2010,
  16. 16.
    Memon, I., & Arain, Q. A. (2017). Dynamic distributed mobility management system based on multiple mix-zones over road networks. arXiv preprint arXiv:1706.02252.
  17. 17.
    Memon, I., & Arain, Q. A. (2017). Optimal placement of mix zones in road networks. arXiv preprint arXiv:1705.11104.
  18. 18.
    Palanisamy, B., & Liu, L. (2011). MobiMix: Protecting location privacy with mix zones over road networks. In Proceedings of the 27th IEEE international conference on data engineering (ICDE’11) (pp. 494–505).Google Scholar
  19. 19.
    Carianha, A. M., Barreto, L. P., & Lima, G. (2011). Improving location privacy in mix-zones for VANETS. In 2011 IEEE 30th international performance computing and communications conference (IPCCC) (pp. 1–6).Google Scholar
  20. 20.
    Freudiger, J., Shokri, R., & Hubaux, J. P. (August 5-7 2009). On the optimal placement of mix zones. In Privacy enhancing technologies symposium (PETS), Seattle (pp. 216–234).Google Scholar
  21. 21.
    Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRefGoogle Scholar
  22. 22.
    Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications. doi: 10.1007/s11277-014-1996-4.CrossRefGoogle Scholar
  23. 23.
    Li, M., & Sampigethaya, K., et. al. (2006). Swing & swap: User-centric approaches towards maximizing location privacy. In WPES (pp. 19–28).Google Scholar
  24. 24.
    Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Dynamic mix-zone for location privacy in vehicular networks. IEEE Communications Letters, 17(8), 1524.CrossRefGoogle Scholar
  25. 25.
    Humbert, M., & Manshaei, M. H., (2009). On the optimal placement of mix zones: A game-theoretic approach. In Proceeding of the 16th acm conference on computer and communications security (pp. 324–337).Google Scholar
  26. 26.
    Bibmeyer, N., Petit, J., & Bayarou, K. M. (2013). Copra: Conditional pseudonym resolution algorithm in VANETs. In 2013 10th annual conference on wireless on-demand network systems and services (WONS) (pp. 9–16).Google Scholar
  27. 27.
    Freudiger, J., Manshaei, M. H., et al. (2013). Non-cooperative location privacy. IEEE Transactions on Dependable and Secure Computing, 10(2), 84–98.CrossRefGoogle Scholar
  28. 28.
    Memon, M. H., Li, J. P., Memon, I., & Arain, Q. A. (2017). GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications, 76(14), 15377–15411.CrossRefGoogle Scholar
  29. 29.
    Palanisamy, B., Ravichandran, S., Liu, L., Han, B., Lee, K., & Pu, C. (2013). Road network mix-zones for anonymous location based services. In Proceedings of the IEEE 29th international conference on data engineering (ICDE) (pp 1300–1303).Google Scholar
  30. 30.
    Pan, Y., & Li, J. (2013). Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36(6), 1599–1609.MathSciNetCrossRefGoogle Scholar
  31. 31.
    Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.CrossRefGoogle Scholar
  32. 32.
    Kamenyi, D. M., Wang, Y., Zhang, F., & Memon, I. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.Google Scholar
  33. 33.
    Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:  10.1109/ICCPS.2013.6893578.
  34. 34.
    Arain, Q. A., Deng, Z., Memon, I., Zubedi, A., Jiao, J., Ashraf, A., et al. (2017). Privacy protection with dynamic pseudonym-based multiple mix-zones over road networks. China Communications, 14(4), 89–100.CrossRefGoogle Scholar
  35. 35.
    Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: Dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications, 1–30. doi: 10.1007/s11042-016-4154-z.
  36. 36.
    Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems. doi: 10.1002/dac.3312.
  37. 37.
    Arain, Q. A., Memon, I., Deng, Z., Memon, M. H., Mangi, F. A., & Zubedi, A. (2017). Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools and Applications, 1–45. doi: 10.1007/s11042-017-4469-4.
  38. 38.
    Arain, Q. A., Memon, H., Memon, I., Memon, M. H., Shaikh, R. A., & Mangi, F. A. (2017). Intelligent travel information platform based on location base services to predict user travel behavior from user-generated GPS traces. International Journal of Computers and Applications, 39(3), 155–168. doi: 10.1080/1206212X.2017.1309222.
  39. 39.
    Arain, Q. A., Uqaili, M. A., Deng, Z., Memon, I., Jiao, J., Shaikh, M. A., & Arain, U. A. (2016). Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Personal Communications, 95(2), 411–428. doi: 10.1007/s11277-016-3900-x
  40. 40.
    Meyerowitz, J., & Choudhury, R. (2009). Hiding stars with fireworks: Location privacy through camouflage. In MOBICOM 2009.Google Scholar
  41. 41.
    U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at
  42. 42.
    Simulation of urban mobility (SUMO). Available at
  43. 43.
    U.S. Geological Survey.
  44. 44.
    Chen, Y. S., Lo, T. T., Lee, C. H., & Pang, A. C. (2013). Efficient pseudonym changing schemes for location privacy protection in VANETs. In 2013 International Conference on Connected Vehicles and Expo (ICCVE). doi:  10.1109/ICCVE.2013.185.
  45. 45.
    Ying, B, & Makraki, D. (2015). Reputation-based pseudonym change for location privacy in vehicular networks. In IEEE ICC 2015-communications software, services and multimedia applicaations symposium.Google Scholar
  46. 46.
    Sun, Y., Zhang, B., Zhao, B., Su, X., & Su, J. (2015). Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications, 8(6), 1108–1121015.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Beijing University of Posts and TelecommunicationBeijingChina
  2. 2.College of Computer ScienceZhejiang UniversityHangzhouChina
  3. 3.School of Economics and ManagementBeijing University of Posts and TelecommunicationBeijingChina
  4. 4.School of Electronic EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations