Privacy Protection in Vehicular Ad-hoc Networks
Document Type
Contribution to Book
Publication Date
10-2013
Publication Title
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
DOI
10.4018/978-1-4666-4691-9
ISBN
9781466646919
Abstract
The first main contribution of this chapter is to take a non-trivial step towards providing a robust and scalable solution to privacy protection in vehicular networks. To promote scalability and robustness the authors employ two strategies. First, they view vehicular networks as consisting of non-overlapping subnetworks, each local to a geographic area referred to as a cell. Each cell has a server that maintains a list of pseudonyms that are valid for use in the cell. Each pseudonym has two components: the cell’s ID and a random number as host ID. Instead of issuing pseudonyms to vehicles proactively (as virtually all existing schemes do) the authors issue pseudonyms only to those vehicles that request them. This strategy is suggested by the fact that, in a typical scenario, only a fraction of the vehicles in an area will engage in communication with other vehicles and/or with the infrastructure and, therefore, do not need pseudonyms. The second main contribution is to model analytically the time-varying request for pseudonyms in a given cell. This is important for capacity planning purposes since it allows system managers to predict, by taking into account the time-varying attributes of the traffic, the probability that a given number of pseudonyms will be required at a certain time as well as the expected number of pseudonyms in use in a cell at a certain time. Empirical results obtained by detailed simulation confirm the accuracy of the authors’ analytical predictions.
Recommended Citation
Yan, Gongjun, Danda B. Rawat, Bhed B. Bista, A. Alnusair.
2013.
"Privacy Protection in Vehicular Ad-hoc Networks."
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, Danda B. Rawat, Bhed B. Bista, and Gongjun Yan (Ed.) Hershey: IGI.
doi: 10.4018/978-1-4666-4691-9 source: http://www.amazon.com/Security-Resource-Management-Wireless-Communications/dp/1466646918 isbn: 9781466646919
https://digitalcommons.georgiasouthern.edu/electrical-eng-facpubs/52