Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles

Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles

Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Gueroui
DOI: 10.4018/IJSITA.2019100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of vehicles (IoV) is getting a considerable amount of attention from different research parties. IoV aims at enhancing the driving experience with its wide range of applications varying from safety, road management to entertainment; however, some of such applications bring severe security and privacy issues; identity exposing, and location tracking are good examples. By enabling vehicles to send their statuses to themselves via beacon messages, this creates an environmental awareness for safety purposes but also exposes them to the aforementioned attacks. A lot of work has been done to mitigate the effect of such attacks but still does not provide a holistic solution. In this article, which is an extension to a prior work, the authors investigate the effects of changing the transmission range while sending beacons on the achieved level of location privacy based on two location privacy schemes: SLOW and CAPS. The authors use additional privacy metrics in addition to comparing the strategies in some well-known security attacks. The outcomes confirm the feasibility of using such a mechanism.
Article Preview
Top

1. Introduction

1.1 Background

IoV, a special type of Internet of Things (IoT) (Rath, 2018), is considered as a hot research topic in the last few years. IoV comes to assist the design of Vehicular Ad-hoc Networks (VANETs) that focus on reducing the number of fatalities by enabling Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) communications over the Dedicated Short-Range Communication (DSRC) protocol (Kenney, 2011) in addition to the carious Vehicle-to-Everything (V2X) communications (Wang et al., 2019). Thus, a fast reaction may be taken by drivers during dangerous situations. To achieve this goal, each vehicle has to periodically broadcast its status in terms of location, speed, velocity, time, etc. set in a beacon message. This kind of beacon is called Basic Safety Message (BSM) (Corser et al., 2016). Despite the interesting V2X applications like vehicle platooning, incorporated sensors and automated driving, vehicles do suffer from some serious security and privacy vulnerabilities and issues.

1.2 Location Privacy Problem

For fast reaction and less delay, BSM content is not encrypted and sent at least once per second with a radius of about 300 meters (Corser et al., 2016). Thus, any entity having a dedicated eavesdropping station would have access to the driver’s location and this will be exploited next to generate user profiles (Wiedersheim et al., 2010) which has a negative impact on the IoV users’ location privacy. One of the solutions is to use pseudonyms instead of real identities while broadcasting these BSMs and furthermore, making them temporal and changeable over time (Emara et al., 2016). Also, a cross-layer identifier (like MAC and IP) change is needed (Schoch et al., 2006). However, if the pseudonym change was not done in an appropriate time and/or space, a correlation attack may be performed by the adversary to link the new and the old pseudonym. The aforementioned issue had motivated the research community to investigate the problem and develop a lot of robust schemes like (Beresford & Stajano, 2003; Sampigethaya et al., 2005; Huang et al., 2005; Freudiger et al., 2007; Butty´an et al., 2009; Eckhoff et al., 2011; Tomandl et al., 2012; Lu et al., 2012; Emara et al., 2015; Ullah et al., 2017; Babaghayou et al., 2019; Babaghayou & Labraoui, 2019) (are shown in more details in Section 2) to well-protect the user’s location and identity privacy.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing