Title: Hybrid pseudonym change strategy for location privacy in VANET: protecting location privacy in VANET

Authors: Leila Benarous; Benamar Kadri

Addresses: STIC Laboratory, Department of Computer Science, Faculty of Science, University of Abou Bekr Belkaid, Tlemcen, Algeria ' STIC Laboratory, Department of Telecommunications, Faculty of Technology, University of Abou Bekr Belkaid, Tlemcen, Algeria

Abstract: In vehicular ad hoc networks, the vehicles are connected to exchange information to ensure the safety of users. However, its application and real-world deployment are condemned by the privacy risks which may violate the user's confidentiality. The nature of these networks prioritises the safety applications and facilitates the eavesdropping of the attacker. The vehicle periodically broadcasts beacons containing its spatiotemporal information. Moreover, these beacons need to be signed using its temporal public key. Since, none of the above facts can be eliminated, a solution that keeps them yet achieves the location privacy is needed. In this paper, we intend to preserve it by using a robust pseudonym change strategy. The proposed method aims to confuse the attacker when the pseudonym is updated. It is hybrid as it takes the advantage of hiding within the crowd when the update happens in dense roads, and if the vehicle is alone, it executes an obfuscation method to thwart linkability. The proposal is simulated using NS2 against global passive attacker that executes semantic and syntactic linking attacks. The simulation showed high privacy preservation level and strong resiliency to the above-mentioned attacks. A comparative study was added to further illustrate the robustness of our proposal.

Keywords: privacy; pseudonym; anonymity; unlinkability; attacker; simulation.

DOI: 10.1504/IJIPSI.2020.111455

International Journal of Information Privacy, Security and Integrity, 2020 Vol.4 No.3, pp.153 - 169

Received: 06 Sep 2019
Accepted: 25 Mar 2020

Published online: 27 Nov 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article