Back to Search
Start Over
Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough
- Publication Year :
- 2021
- Publisher :
- KTH, Nätverk och systemteknik, 2021.
-
Abstract
- Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudonymous authentication secures communication while enhancing user privacy. To enhance location privacy, cryptographic mix-zones were proposed to facilitate vehicles covertly transition to new ephemeral credentials. The resilience to (syntactic and semantic) pseudonym linking (attacks) highly depends on the geometry of the mix-zones, mobility patterns, vehicle density, and arrival rates. We introduce a tracking algorithm for linking pseudonyms before and after a cryptographically protected mix-zone. Our experimental results show that an eavesdropper, leveraging standardized vehicular communication messages and road layout, could successfully link 73% of pseudonyms during non-rush hours and 62% of pseudonyms during rush hours after vehicles change their pseudonyms in a mix-zone. To mitigate such inference attacks, we present a novel cooperative mix-zone scheme that enhances user privacy regardless of the vehicle mobility patterns, vehicle density, and arrival rate to the mix-zone. A subset of vehicles, termed relaying vehicles, are selected to be responsible for emulating non-existing vehicles. Such vehicles cooperatively disseminate decoy traffic without affecting safety-critical operations: with 50% of vehicles as relaying vehicles, the probability of linking pseudonyms (for the entire interval) drops from 68% to 18%. On average, this imposes 28 ms extra computation overhead, per second, on the Roadside Units (RSUs) and 4.67 ms extra computation overhead, per second, on the (relaying) vehicle side; it also introduces 1.46 KB/sec extra communication overhead by (relaying) vehicles and 45 KB/sec by RSUs for the dissemination of decoy traffic. Thus, user privacy is enhanced at the cost of low computation and communication overhead.<br />Comment: 19 pages, 15 Figures, IEEE Internet of Things Journal
- Subjects :
- FOS: Computer and information sciences
Safety engineering
Computer Science - Cryptography and Security
Computer science
Extra computations
Cryptography
02 engineering and technology
Pseudonym
Electrical Engineering, Electronic Engineering, Information Engineering
Communications system
Road vehicles
Overhead (business)
0202 electrical engineering, electronic engineering, information engineering
Elektroteknik och elektronik
Inference attacks
VANETs
Communication Systems
05 social sciences
Roads and streets
Computer Science Applications
Semantics
Vehicular communications
Hardware and Architecture
Privacy
Location Privacy
Anonymity
Cryptography and Security (cs.CR)
Vehicular networks
Kommunikationssystem
Information Systems
Computer network
Mix Networks
Computer Networks and Communications
0502 economics and business
Cooperative locations
Resilience (network)
Dissemination
050210 logistics & transportation
Authentication
Vehicular ad hoc network
business.industry
Vehicular Communication
Privacy by design
Critical operations
020206 networking & telecommunications
Tracking algorithm
Communication overheads
Signal Processing
business
Pseudonymity
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Accession number :
- edsair.doi.dedup.....80f6100efef610153447f5069ffb2b63