Location Privacy Protection Scheme Based on Random Encryption Period in VANETs

  • Tianhan Gao
  • Xin XinEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 773)


How to ensure location privacy has become an important issue for VANETs’ security. The more effective mechanism is that the vehicles can not be associated by replacing the pseudonyms to protect their location privacy. This paper proposes a novel location privacy protection scheme for VANETs. When vehicles need to change the pseudonyms, they will cooperate with the neighbor nodes to create the encrypted area through group key encryption, so that the external adversary cannot crack the message in this area. During this period, some vehicles change the pseudonyms jointly so that the external adversary can not associate the pseudonyms before and after. Thus the location privacy protection of the vehicle nodes is achieved.


  1. 1.
    Dedicated short range communications (2006).
  2. 2.
    Wang, J., Wang, Y., Geng, J., et al.: Secure and privacy-preserving scheme based on pseudonyms exchanges for VANET. J. Tsinghua Univ. (Sci & Tech) 52(5), 592–597 (2012)Google Scholar
  3. 3.
    Wiedersheim, B., Ma, Z., Kargl, F., et al.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Seventh International Conference on Wireless On-Demand Network Systems and Services, pp. 176–183. IEEE (2010)Google Scholar
  4. 4.
    Freudiger, J., Raya, M., et al.: Mix-zones for location privacy in vehicular networks. In: WiN-ITS 2007 (2007)Google Scholar
  5. 5.
    Lu, R., Lin, X., Luan, T.H., et al.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)CrossRefGoogle Scholar
  6. 6.
    Wasef, A., Shen, X.: REP: location privacy for VANETs using random encryption periods. Mob. Netw. Appl. 15(1), 172–185 (2010)CrossRefGoogle Scholar
  7. 7.
    Misra, S., Verma, M.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)CrossRefGoogle Scholar
  8. 8.
    He, D., Zeadally, S., Kumar, N., et al.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052–2064 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Northeastern UniversityShenyangChina

Personalised recommendations