Advertisement

Intersection Attack on Anonymity in VANET

  • Brijesh Kumar Chaurasia
  • Shekhar Verma
  • Geetam Singh Tomar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7420)

Abstract

A vehicular ad hoc network (VANET) is a form of mobile ad hoc networks, which provides communication among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET provides comfort and safety to passengers and is infrastructure aided network, which does not have centralized monitoring authority but having dynamic topology and shares wireless channel for communication. This network is highly vulnerable to attacks due to open medium. A vehicle can be tracked through its transmission. The broadcast by a source vehicle contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location through the communication broadcast is a threat to privacy. As a vehicle moves on a road, its neighborhood varies. This change in the nature and size of the neighborhood changes its effective entropy and makes its vulnerable to intersection attacks. This paper presents intersection attack on anonymity in VANET in the presence of local and global attacker. Simulation and results indicates that interaction attack may be breach the privacy even when security mechanisms are enabled in vehicles.

Keywords

VANET Intersection attacks anonymity entropy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Malta, L., Miyajima, C., Takeda, K.: A Study of Driver Behavior Under Potential Threats in Vehicle Traffic. IEEE Transactions on Intelligent Transportation Systems 10(2), 201–210 (2009)CrossRefGoogle Scholar
  2. 2.
    Dedicated Short Range Communications (DSRC), http://www.leearmstrong.com/Dsrc/DSRCHomeset.htm
  3. 3.
    Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate Revocation in Vehicular Networks. In: Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland (2006)Google Scholar
  4. 4.
    Blum, J., Eskandarian, A., Hoffman, L.: Challenges of inter- vehicle ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 5(4), 347–351 (2004)CrossRefGoogle Scholar
  5. 5.
    Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems. Computer Communications 31(12), 2838–2849 (2008)CrossRefGoogle Scholar
  6. 6.
    Chaurasia, B.K., Verma, S., Tomar, G.S.: Infrastructure Aided Privacy Preserving-Authentication in VANETs. In: Kim, T.-h. (ed.) ISA 2010. LNCS, vol. 76, pp. 179–189. Springer, Heidelberg (2010)Google Scholar
  7. 7.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. Journal of IEEE Wireless Communication 13(5), 8–15 (2006)CrossRefGoogle Scholar
  8. 8.
    Parno, B., Perrig, A.: Challenges in Securing Vehicular Networks. In: 4th Workshop on Hot Topics in Networks (2005)Google Scholar
  9. 9.
    Al-Qutayri, M., Yeun, C., Al-Hawi, F.: Security and Privacy of Intelligent VANETs. In: Computational Intelligence and Modern Heuristics, INTECH, pp. 191–218 (2010)Google Scholar
  10. 10.
    Chaurasia, B.K., Verma, S., Tomar, G.S.: Mechanism for Privacy Preservation in VANETs. The Journal of International Journal of Grid and High Performance Computing (IJGHPC), Special Issue on: “Grid computing and Security” 2(2), 12–22 (2010)Google Scholar
  11. 11.
    Raya, M., Hubaux, J.P.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security, Special Issue on Security, Ad Hoc and Sensor Networks 15(1), 39–68 (2007)Google Scholar
  12. 12.
    Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security (TISSEC) 1(1), 66–92 (1998)CrossRefGoogle Scholar
  13. 13.
    Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)Google Scholar
  14. 14.
    Chaurasia, B.K., Verma, S.: Maximising Anonymity of a Vehicle. In the Inderscience, International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications 3(2), 198–216 (2010)Google Scholar
  15. 15.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Tech. Report SRI-CSL-98-04, CS Lab, SRI International (1998) Google Scholar
  16. 16.
    Wu, X., Bertino, E.: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. on Dependable and Secure Computing 4(4), 252–264 (2007)CrossRefGoogle Scholar
  17. 17.
    Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing Wireless Location Privacy Using Silent Period. In: Wireless Communications and Networking Conference (WCNC 2005), vol. 2, pp. 1187–1192 (2005)Google Scholar
  18. 18.
    Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  19. 19.
    Burmester, B., Magkos, E., Chrissikopoulous, V.: Strengthening Privacy in VANETs. In: IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (WiMob), pp. 508–513 (2008)Google Scholar
  20. 20.
    Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES 2006: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 19–27 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Brijesh Kumar Chaurasia
    • 1
  • Shekhar Verma
    • 2
  • Geetam Singh Tomar
    • 3
  1. 1.ITM UniversityGwaliorIndia
  2. 2.Indian Institute of Information TechnologyAllahabadIndia
  3. 3.MIR LabsGwaliorIndia

Personalised recommendations