DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

I Memon, Q Ali, A Zubedi, FA Mangi - Multimedia Tools and Applications, 2017 - Springer
I Memon, Q Ali, A Zubedi, FA Mangi
Multimedia Tools and Applications, 2017Springer
Road traffic information has become indispensable for routine vehicular communication but
user location privacy an important issue which did not well addressed. An adversary may
attack a user by tracking location in routine vehicular communication. Although, continuously
changing pseudonyms is a promising solution to attain location privacy in road networks, it
has been observed that changing pseudonym at improper time or location may again
become a threat for location preservation. As a result, a number of techniques for …
Abstract
Road traffic information has become indispensable for routine vehicular communication but user location privacy an important issue which did not well addressed. An adversary may attack a user by tracking location in routine vehicular communication. Although, continuously changing pseudonyms is a promising solution to attain location privacy in road networks, it has been observed that changing pseudonym at improper time or location may again become a threat for location preservation. As a result, a number of techniques for pseudonym-change have been proposed to achieve location privacy on road networks but most of location based services depend upon speed, GPS position and direction angle services. Hence, sensitive information is periodically broadcasted in every 100-300 ms providing an opportunity to adversaries for accessing critical information and easily tracking vehicles. Moreover, existing methods such as RPCLP, EPCS and MODP for attaining location privacy in mix-zones environment have severely suffered due to large number of pseudonym-changes. To cope with these issues, we presented a Dynamic Pseudonym based Multiple Mix-zones (DPMM) strategy to acquire the highest level of accuracy and privacy. The concept of executing dynamic pseudonym change has been forwarded with respect to pseudonyms, velocity and direction of moving objects. We performed our simulations by using one SUMO simulator and analyzed results compared with existing pseudonym-changing techniques. Our simulation results outperformed various existing techniques and provided better results for achieving high privacy rate, requiring small number of pseudonym-change as well as providing best performance.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果