Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks
- PDF / 2,035,234 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 66 Downloads / 203 Views
Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks Imran Memon1 · Hina Memon2 · Qasim Ali Arain3 Accepted: 28 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks. Keywords Lbss · Location privacy · Authentication key establishment protocols · Road network
* Imran Memon [email protected] * Hina Memon [email protected] 1
Department of Computer Science, Bahria University, Karachi Campus (BUKC), Karachi, Sindh, Pakistan
2
Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan
3
Department of Software Engineering, Mehran University of Engineering and Technology, Jamshoro, Pakistan
13
Vol.:(0123456789)
I. Memon et al.
1 Introduction There is great advancement in vehicular technologies and emerging technology to allow vehicle exchange information with each other, increase the vehicle safety establishment protocol between V&I and V&V communications [1]. Intelligent Transportation Systems (ITS) application mostly used vehicular ad hoc networks. In road networks, Inter-Vehicle Communication (IVC) such as vehicle communicate each other and also with Infrastructure located along with roadside through a roadside unit. This model infrastructure would deliver security to the consumers at desired location by presenting time to time info to the consumer. However, the road network un-like mobile adhoc network might not work on the rules and regulations of MANETs, because of different frequencies and communication range. In the early stage of 2000. Nowadays, Vehicular ad hoc networks has been emerged as inter-vehicular communicat
Data Loading...