Skip to main content

Identity Privacy Protection in Smart Parking Navigation

  • Chapter
  • First Online:
Privacy-Enhancing Fog Computing and Its Applications

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 434 Accesses

Abstract

Due to the large volumes of modern vehicles in metropolises, finding a vacant parking space has become an irritating and frustrating problem for drivers, particularly in a congested area, such as sport centers, shopping malls, and downtown [1]. The extra traffic cruising for parking spaces brings serious social problems, including traffic congestion, vehicle accident, fuel waste, and air pollution [2]. Although Google Maps and portable navigators assist drivers to discover parking garages in destinations, drivers are then faced with a problem that no vacant parking space are available [3].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Lu, X. Lin, H. Zhu, and X. Shen, “An intelligent secure and privacy-preserving parking scheme through vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 6, pp. 2772–2785, 2010.

    Article  Google Scholar 

  2. H. Li, M. Dong, and K. Ota, “Control plane optimization in software-defined vehicular ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 7895–7904, 2016.

    Article  Google Scholar 

  3. J. Ni, X. Lin, K. Zhang, and X. Shen, “Privacy-preserving real-time navigation system using vehicular crowdsourcing,” in Proc. of VTC-Fall, 2016, pp. 1–5.

    Google Scholar 

  4. P. R. Pereira, A. Casaca, J. J. Rodrigues, V. N. Soares, J. Triay, and C. Cervello-Pastor, “From delay-tolerant networks to vehicular delay-tolerant networks,” IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 1166–1182, 2012.

    Article  Google Scholar 

  5. R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. of IEEE INFOCOM, 2008, pp. 1229–1237.

    Google Scholar 

  6. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, “Security and privacy in smart city applications: Challenges and solutions,” IEEE Communications Magazine, vol. 55, no. 1, pp. 122–129, 2017.

    Article  Google Scholar 

  7. L. Guo, M. Dong, K. Ota, Q. Li, T. Ye, J. Wu, and J. Li, “A secure mechanism for big data collection in large scale internet of vehicle,” IEEE Internet of Things Journal, vol. 4, no. 2, pp. 601–610, 2017.

    Article  Google Scholar 

  8. M. A. Pandi Vijayakumar, A. Kannan, and L. J. Deborah, “Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015–1028, 2016.

    Article  Google Scholar 

  9. J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “An identity-based security system for user privacy in vehicular ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227–1239, 2010.

    Article  Google Scholar 

  10. J. Cheng, “How apple tracks your location without consent, and why it matters,” Ars Technica, 2011.

    Google Scholar 

  11. D. J. Wu, J. Zimmerman, J. Planul, and J. C. Mitchell, “Privacy-preserving shortest path computation,” arXiv preprint arXiv:1601.02281, 2016.

    Google Scholar 

  12. D. Liu, J. Ni, X. Lin, and X. Shen, “Anonymous group message authentication protocol for lte-based v2x communications,” Internet Technology Letters, vol. 1, no. 2, p. e25, 2018.

    Article  Google Scholar 

  13. M. D. Dikaiakos, A. Florides, T. Nadeem, and L. Iftode, “Location-aware services over vehicular ad-hoc networks using car-to-car communication,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, 2007.

    Article  Google Scholar 

  14. J.-L. Huang, L.-Y. Yeh, and H.-Y. Chien, “Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 1, pp. 248–262, 2011.

    Article  Google Scholar 

  15. T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li, “Vspn: Vanet-based secure and privacy-preserving navigation,” IEEE Transactions on Computers, vol. 63, no. 2, pp. 510–524, 2014.

    Article  MathSciNet  Google Scholar 

  16. Y. He, J. Ni, X. Wang, B. Niu, F. Li, and X. Shen, “Privacy-preserving partner selection for ride-sharing services,” IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 5994–6005, 2018.

    Article  Google Scholar 

  17. Q. Jiang, J. Ni, J. Ma, L. Yang, and X. Shen, “Integrated authentication and key agreement framework for vehicular cloud computing,” IEEE Network, vol. 32, no. 3, pp. 28–35, 2018.

    Article  Google Scholar 

  18. J. Ni, K. Zhang, X. Lin, Y. Yu, and X. Shen, “Cloud-based privacy-preserving parking navigation through vehicular communications,” in Proc. of Securecomm, 2016, pp. 85–103.

    Google Scholar 

  19. D. Pointcheval and O. Sanders, “Short randomizable signatures,” in Proc. of CT-RSA, 2016, pp. 111–126.

    Google Scholar 

  20. C. Dong, L. Chen, and Z. Wen, “When private set intersection meets big data: an efficient and scalable protocol,” in Proc. of ACM CCS, 2013, pp. 789–800.

    Google Scholar 

  21. D. Boneh and X. Boyen, “Short signatures without random oracles,” in Proc. of EUROCRYPT, 2004, pp. 56–73.

    Google Scholar 

  22. M. H. Au, J. K. Liu, J. Fang, Z. L. Jiang, W. Susilo, and J. Zhou, “A new payment system for enhancing location privacy of electric vehicles,” IEEE transactions on vehicular technology, vol. 63, no. 1, pp. 3–18, 2014.

    Article  Google Scholar 

  23. W. Xu, H. A. Omar, W. Zhuang, and X. Shen, “Delay analysis of in-vehicle internet access via on-road wifi access points,” IEEE access, vol. 5, pp. 2736–2746, 2017.

    Article  Google Scholar 

  24. M. Scott, “Multiprecision integer and rational arithmetic c/c++ library (miracl),” URL: http://www.shamus.ie, 2003.

  25. J.-L. Beuchat, J. E. González-Díaz, S. Mitsunari, E. Okamoto, F. Rodríguez-Henríquez, and T. Teruya, “High-speed software implementation of the optimal ate pairing over barreto–naehrig curves,” in Proc. of Pairing, 2010, pp. 21–39.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X., Ni, J., Shen, X.(. (2018). Identity Privacy Protection in Smart Parking Navigation. In: Privacy-Enhancing Fog Computing and Its Applications. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-02113-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02113-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02112-2

  • Online ISBN: 978-3-030-02113-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics