A Group Leader Location Hiding Technique for VANETs

A Group Leader Location Hiding Technique for VANETs

Shaker Aljallad, Raad S. Al-Qassas, Malik Qasaimeh
Copyright: © 2017 |Pages: 14
DOI: 10.4018/IJDST.2017070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Vehicular ad hoc network (VANET) is one of the most promising and emerging communication technologies that could definitely lead to significant improvements in the traffic management and safety. Location privacy is a critical requirement in VANET, since location information may be shared between vehicles to support the VANET applications. Therefore, it is crucial to protect the location of users. In this paper, we propose a location privacy protection technique that utilises the shadow concept and takes into consideration the reliability in protecting the group leader location, which would basically provide the needed anonymity and protection for the location information targeted by global adversaries. The performance of the proposed technique has been investigated through simulation and compared against the well-known AOSA technique. The results from extensive simulations have shown that the proposed technique enhances the anonymity of the group leader vehicle by reducing the time that the global adversaries can use in collecting location information.
Article Preview
Top

Introduction

Vehicular ad hoc networks (VANETs) provide a new way of wireless communication that enables the vehicles to communicate with each other based on the ad hoc network concept. Vehicles can easily interact and communicate with each other across the road without the need of intermediary networking devices. VANETs are intended to support various applications such as vehicle safety and traffic management applications, which may improve the efficiency, safety, and reliability of the transportation system. Vehicles in VANET can communicate with each other directly forming what is known as Vehicle to Vehicle (V2V) communication (Al-Sultan, Al-Doori, Al-Bayatti, & Zedan, 2014), or can communicate with Road Side Units (RSUs) forming Vehicle to Infrastructure (V2I) communication (Grover, Gaur, Laxmi, & Tiwari, 2012). To allow communication between vehicles, each vehicle must be equipped with a wireless communication device known as On-Board Unit (OBU). Vehicles may exchange information such as road service information, collision warnings, and traffic congestions. The communication between vehicles is based on the Dedicated Short Range Communication (DSRC) system, which utilizes the IEEE 802.11p wireless communication standard (Kenney, 2011). Vehicles may be also equipped with crypto devices for protecting critical vehicle data securely in an encrypted way. The infrastructure and the ad hoc environments are connected together using the RSUs, which act as gateways that are widely deployed across the road to deliver packets to the infrastructure side and to make it routable to the Internet. Security and privacy in VANET are receiving major attention from researchers in the recent years (Hussain, Rezaeifar, Lee, & Oh, 2015; Landwehr et al., 2012; Mei, Jiang, Zhang, & Cui, 2014; Mejri, Ben-Othman, & Hamdi, 2014; Raw, Kumar, & Singh, 2013; Yan, Yang, Lin, & Rawat, 2012).

The nature of VANET communication and the way data is being shared between nodes could lead to unique vulnerabilities and several security threats. Therefore, it is important to apply the appropriate countermeasures in order to overcome the most common vulnerabilities and weaknesses. Security and privacy could affect the applicability of the VANET system. Variety types of security attacks and threats target the VANET environment, which compromises the main security aspects such as confidentiality, integrity, and availability. For example, a man in the middle attack compromises the confidentiality of the communicating entities by illegitimately eavesdropping packets exchanged between two legitimate vehicle nodes. Therefore, it is important to apply the appropriate countermeasures and techniques to overcome the most recent vulnerabilities (Mejri et al., 2014). Accompanied by the advances and huge evolution in mobile communication technologies and the growing demand for location-based applications in our life, there are several security threats that need to be controlled. Many applications in VANET rely on location information of vehicle nodes, whether these applications are for safety or non-safety purposes (Al-Qassas, 2016). These applications depend on the use of beacon packets and warning probes, which may contain critical information about the vehicles and their users. These information may include location, speed, direction and destination. Thus, the privacy of users including their location could be threatened in many different ways.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing