| Literature DB >> 33916309 |
Messaoud Babaghayou1, Nabila Labraoui1, Ado Adamou Abba Ari2,3, Mohamed Amine Ferrag4, Leandros Maglaras5, Helge Janicke6.
Abstract
Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various privacy-preserving schemes have been designed and evaluated, for example, mix-zone, encryption, group forming, and silent-period-based techniques. However, they all suffer inherent limitations. In this paper, we review these limitations and propose WHISPER, a safety-aware location privacy-preserving scheme that adjusts the transmission range of vehicles in order to prevent continuous location monitoring. We detail the set of protocols used by WHISPER, then we compare it against other privacy-preserving schemes. The results show that WHISPER outperformed the other schemes by providing better location privacy levels while still fulfilling road-safety requirements.Entities:
Keywords: iov privacy; iov safety; location privacy; pseudonym change strategy; transmission range adjustment; vanet
Mesh:
Year: 2021 PMID: 33916309 PMCID: PMC8036517 DOI: 10.3390/s21072443
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Vehicle to Everything (V2X) technology illustration.
Figure 2Basic Safety Message (BSM) beacon format.
Comparison of related works.
| Year | Scheme | Network Model | Technique Used | Pros (+) | Cons (−) |
|---|---|---|---|---|---|
| 2007 | Freudiger et al. [ | Vehicular networks | Symmetric key-based cryptography | + Provides location privacy | − The proposed scheme did not consider the internal attacker scenario |
| 2009 | Buttyán et al. [ | Vehicular networks | Pseudonym changing scheme | + Ensures both silent periods and synchronized pseudonym change in time and space | − Intrusion detection is not considered |
| 2011 | Eckhoff et al. (2011) [ | Intelligent transportation systems | A time-slotted pool to manage pseudonyms by each vehicle | + Affordable location privacy | − Resistance against Sybil attacks is not considered |
| 2012 | Lu et al. [ | Vehicular networks | The feature of social spots, which are places where vehicles meet more frequently | + Provides location privacy | − Limited analysis against threat models |
| 2013 | Pan and Li [ | Vehicular networks | Cooperative pseudonym change scheme based on the number of neighbors | + Provides anonymity | − Intrusion detection is not considered |
| 2017 | Ferrag and Ahmim [ | Vehicular peer-to-peer social network | Searchable encryption with vehicle proxy re-encryption | + Provide privacy for resources, authentication and data integrity of the demand’s source | − Limited analysis with threat models against botnet attacks |
| 2018 | Zidani et al. [ | Vehicular ad-hoc network | Estimation of neighbors position privacy scheme with an adaptive beaconing approach | + Provides location privacy | − Limited analysis against threat models |
| 2019 | Babaghayou et al. [ | Vehicular networks | Location-privacy evaluation within the extreme points privacy | + Provides location privacy | − Limited analysis against threat models |
| 2020 | Aman et al. [ | Internet of vehicles | Physical unclonable functions | + Reduces the overhead of authentication and improves the throughput of application layer packets | − Resistance against DDoS attacks |
| 2020 | Song et al. [ | Internet of vehicles | Fog-based identity authentication scheme | + Reduces the burden on the traffic control center | − Resistance against Botnet attacks |
| 2020 | Sutrala et al. [ | Internet of vehicles | Elliptic Curve Cryptography (ECC) technique | + Secures against a passive/active adversary through various security analysis | − Communication and computation overhead |
| 2020 | Dwivedi et al. [ | Internet of vehicles | Blockchain technology | + Supports data immutability property | − The limited analysis against the threat models |
| 2020 | Zhang and Li [ | Internet of vehicles | - Task allocation and data aggregation mechanism - Robin Steiner bargaining game model | + Encourages selfish nodes to perform data transmission and reduce time delay | − Limited analysis against threat models |
| 2020 | Vasudev et al. [ | Vehicle to Vehicle (V2V) communication in the Internet of Vehicles | Lightweight mutual authentication protocol | + Secure communication, while minimizing computational cost | − Limited analysis against threat models |
| 2021 | Kamal et al. [ | V2V communication in the Internet of Vehicles | Blockchain technology and channel characteristics of wireless networks in V2V communication | + Provides real time adversary detection within the network | − Energy and computation overhead |
| 2021 | Bagga et al. [ | Internet of Vehicles-enabled intelligent transportation system | Mutual authentication and key agreement protocol | + Secures against a passive/active adversary through various security analysis | − Communication and computational overhead |
Figure 3The different entities of the vehicular network.
Figure 4Threat model and its resources, capabilities, and coverage.
Figure 5The used coverage mode (moderate mode) details.
WHISPER keywords, concepts, and detailed definitions.
| The Concept | Its Definition |
|---|---|
| The different speed levels (km/h) | Low (≥0 & <18), Medium (≥18 & <36), beyond-Medium (≥36 & <54), High (≥54) |
| The position of | |
| The speed of | |
| The highest speed that was encountered while | |
| The distance between the sending vehicle | |
| Calculates the distance between point | |
| A virtual range with the same value for each receiving vehicle | |
| whether a sending vehicle | |
| If | |
| General Neighbor | |
| A virtual range with the same value for each receiving vehicle | |
| whether a sending vehicle | |
| it and | |
| A virtual range with the same value for each receiving vehicle | |
| whether a sending vehicle | |
| considered as a Close Neighbor if it is inside the | |
| range ought to be very small in order to let both | |
| as possible to confuse the attacker when doing the pseudonym change action | |
| A local variable that each vehicle | |
| proximity of another vehicle | |
| congestion-aware actions, etc.) | |
| This procedure uses the received BSM packet for the IoV objectives and requirements | |
| (to achieve road-safety, entertainment, congestion-aware actions, etc.) | |
| A true or false value which means a sending vehicle | |
| An amount of time in where | |
| Generates a BSM packet that will be ready for broadcasting | |
| The transmission power given to the network interface used to control the transmission | |
| range of | |
| A counter variable used later on to decide the pseudonym change action | |
| The default value of | |
| find out the eligibility of | |
| Gives the BSM packet to the lower layers which will broadcast it to the neighbors | |
|
| Checking whether the trigger of |
| ( | |
| Once the conditions are met and once it is executed correctly, | |
| pseudonym (and certificate respectively) |
Figure 6The state diagram of WHISPER.
Figure 7WHISPER behavior in the presence and influence of general neighbors on the transmission range adjustment.
Figure 8WHISPER behavior in the presence and influence of road neighbors on the transmission range adjustment.
Figure 9WHISPER, pseudonym change process triggered by a close neighbor’s status.
Simulation parameters and values.
| Parameters | Value | |
|---|---|---|
| Mobility | Vehicles Number | Simultaneously = 50, 100, 150, 200 |
| Total = 100, 200, 300, 400 | ||
| Insertion method | Quasi-Instant | |
| (first second insertion) | ||
| Mobility Model | RandomTrips with minimum | |
| distance = 1500 m | ||
| Environment | Used Map | Manhattan grid model |
| 9 roads, 200 m per segment | ||
| Map size | 2000 × 2000 m | |
| 4 km | ||
| Simulation Time | 300 s | |
| Evaluation | Privacy metrics | Traceability |
| N_Traceability | ||
| Pseudonym usage/ consumption | Number of changed-pseudonyms | |
| Strategy | SLOW | Speed threshold = 8 m/s |
| Silence threshold = 5 s | ||
| RSP | Pseudonym duration = 60 s | |
| Silence period = from 3 to 9 s randomly | ||
| CPN | Neighbors radius = 100 m | |
| Neighbors threshold = 2 | ||
| WHISPER | Road neighbors radius = 100 m | |
| General neighbors radius = 30 m | ||
| Close neighbors radius = 30 m | ||
| Counter default value = 50 |
Figure 10The block diagram of the different used simulation tools.
Figure 11The achieved traceability by SLOW, Random Silent Period (RSP), Cooperative Pseudonym Change (CPN), and WHISPER within different densities.
Figure 12The achieved normalized traceability by SLOW, RSP, CPN, and WHISPER within different densities.
Figure 13The pseudonyms changes (consumption) evaluation of CPN, WHISPER, RSP, and SLOW within different densities.
A brief comparison of SLOW, RSP, CPN, and WHISPER strategies according to a set of metrics.
| Staying Silent | Monitoring Neighbors | Pseudonyms Consumption | Safety Ensuring | More Efficiency When | |
|---|---|---|---|---|---|
| SLOW [ | ✓ | ✗ | Low | ✗ | Driving in low speeds, hence, keeping silence |
| RSP [ | ✓ | ✗ | Low | ✗ | Entering silence and changing pseudonyms synchronously |
| CPN [ | ✗ | ✓ | Very high | ✓ | The set of vehicles happens to be large |
| WHISPER | ✗ | ✓ | Medium | ✓ | Low transmission power condition is satisfied |