Advertisement

Speed Based Attacker Placement for Evaluating Location Privacy in VANET

  • Ikjot SainiEmail author
  • Sherif Saad
  • Arunita Jaekel
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 258)

Abstract

The deployment of connected and autonomous vehicles is expected to increase rapidly in the coming decade. For successful operation, it is critical to maintain the security and privacy of the communication messages exchanged among such vehicles. One important aspect of this is to maintain the location privacy of vehicles/users that use unencrypted basic safety messages (BSM) to exchange information with nearby vehicles. The use of temporary identifiers called pseudonyms have been proposed for protecting location privacy. A pseudonym change strategy (PCS) determines the conditions under which pseudonyms should change. The goal is to change pseudonyms in a way that prevents an attacker from linking multiple pseudonyms to the same vehicle. In this paper we explore how an intelligent attacker placement scheme can impact the success rate for linking pseudonyms. We propose a new speed-based attacker placement algorithm that can be used to evaluate different PCS. Simulation results indicate that the proposed scheme is able to increase the rate for successfully linking vehicle pseudonyms.

Keywords

VANET security Pseudonym change Attacker placement Location privacy Vehicle tracking 

References

  1. 1.
    Harnstein, H., Laberteaux, L.P.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)CrossRefGoogle Scholar
  2. 2.
    IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-channel Operation, IEEE Std 1609.4-2010 (Revision of IEEE Std 1609.4-2006) (2011)Google Scholar
  3. 3.
    Kenney, J.: Dedicated short-range communciations (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011)CrossRefGoogle Scholar
  4. 4.
    Golle, P., Partridge, K.: On the anonymity of home/work location Pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-01516-8_26CrossRefGoogle Scholar
  5. 5.
    Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Drummond, J., et al. (eds.) Dynamic and Mobile GIS: Investigating Change in Space and Time, pp. 34–51. CRC Press, Boca Raton (2006)Google Scholar
  6. 6.
    Emara, K.: Beacon-based vehicle tracking in vehicular ad-hoc networks, Technical report, TECHNISCHE UNIVERSITAT MUNCHEN (2013)Google Scholar
  7. 7.
    Gerlach, M.: Assessing and improving privacy in VANETs. In: Proceedings of 4th Workshop ESCAR, pp. 1–9 (2006)Google Scholar
  8. 8.
    Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015)CrossRefGoogle Scholar
  9. 9.
    Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129–141. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-73275-4_10CrossRefGoogle Scholar
  10. 10.
    Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing and swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 19–28. ACM (2006)Google Scholar
  11. 11.
    Freudiger, J., Raya, M., Felegyhazi, P.P., Papadimitratos, P., Hubaux, J.P.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS) (2007)Google Scholar
  12. 12.
    Brecht, B., et al.: Security credential management system for V2X communications. IEEE Trans. Intell. Transp. Syst. 99, 1–22 (2018)Google Scholar
  13. 13.
    Buttyan, L., Holczer, T., Weimerskirch, A., Whyte, W.: SLOW: a practical pseudonym changing scheme for location privacy in VANETs. In: 2009 IEEE Vehicular Networking Conference VNC, pp. 1–8 (2009)Google Scholar
  14. 14.
    Song, J.H., Wong, V.W., Leung, V.C.: Wireless location privacy protection in vehicular ad-hoc networks. Mob. Netw. Appl. 15(1), 160171 (2010)CrossRefGoogle Scholar
  15. 15.
    Liao, J., Li, J.: Effectively changing pseudonyms for privacy protection in vanets. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 648–652. IEEE (2009)Google Scholar
  16. 16.
    Wasef, A., Shen, X.: Rep: location privacy for vanets using random encryption periods. Mob. Netw. Appl. 15(1), 172–185 (2010)CrossRefGoogle Scholar
  17. 17.
    Weerasinghe, H., Fu, H., Leng, S., Zhu, Y.: Enhancing unlinkability in vehicular ad hoc networks. In: 2011 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 161–166. IEEE (2011)Google Scholar
  18. 18.
    Ullah, I., Wahid, A., Shah, M.A., Waheed, A.: VBPC: velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET. In: 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, pp. 132–137 (2017)Google Scholar
  19. 19.
    Saini, I., Saad, S., Jaekel, A.: attacker placement for detecting vulnerabilities of pseudonym change strategies in VANET. In: 1st International Workshop on Dependable Wireless Communications (DEWCOM), Chicago, USA (2018)Google Scholar
  20. 20.
    Emara, K., Woerndl, W., Schlichter, J.: Beacon-based vehicle tracking in vehicular ad-hoc networks. Technical report, TECHNISCHE UNIVERSITAT MUNCHEN (2013)Google Scholar
  21. 21.
    Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of SUMO-Simulation of Urban MObility. Int. J. Adv. Syst. Meas. (2012)Google Scholar
  22. 22.
    Andrs, V., Hornig, R.: An overview of the OMNeT++ simulation environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems and Workshops, Institute for Computer Sciences, Social- Informatics and Telecommunications Engineering (2008)Google Scholar
  23. 23.
    Sommer, C., German, R., Dressler, F.: Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 10(1), 3–15 (2011)CrossRefGoogle Scholar
  24. 24.
    Emara, K.: Poster: PREXT: privacy extension for veins VANET simulator. In: Vehicular Networking Conference VNC. IEEE (2016)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.School of Computer ScienceUniversity of WindsorWindsorCanada

Personalised recommendations