PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs
Abstract
:1. Introduction
- (1)
- We improve the ID-based linearly homomorphic signature scheme and construct a pseudonym generation and aggregate protocol, where vehicles are able to calculate legitimate pseudonym certificates without the participation of the RSUs. Meanwhile, vehicles can judge the conditions for pseudonym change independently and obtain the necessary information through vehicle-to-vehicle (V2V) communication to enhance the safety of the subsequent pseudonym change protocol.
- (2)
- The vehicle registration protocol, authentication protocol, and pseudonym revocation protocol are proposed, which guarantee that all legal vehicles are able to communicate with surrounding entities and compromised vehicles can be revealed in time.
- (3)
- The computational cost and communication cost are adopted to evaluate the performance of the V2I authentication protocol in PCP. In addition, the vehicles in network simulation framework (Veins) is introduced to simulate the pseudonym change protocol of the proposed scheme to verify the effectiveness.
2. Related Works
2.1. Mix-Zone-Based Strategies
2.2. Silent-Period-Based Strategies
3. Preliminaries
3.1. Bilinear Pairing
3.2. Computational Diffie–Hellman Assumption
3.3. Identity-Based Signature Mechanism
4. The Proposed Scheme
4.1. System Architecture
- Scenario 1: In the area with a low vehicle density and no RSUs, if there are non-negligible differences in vehicle driving statuses, it is difficult to make an effective mechanism of pseudonym change in order to resist the tracking of external attackers. However, we hope to provide an efficient mechanism to make full use of such a scenario and obtain enough useful information as much as possible, so as to provide a higher level of location privacy preserving.
- Scenario 2: There is a high vehicle density in this area, and RSUs exist to provide services for surrounding vehicles. In this scenario, the vehicles and RSUs can cooperate to change their pseudonyms and resist the attacks from external adversaries for protecting the location privacy of vehicles.
- Scenario 3: The RSUs exist, but the vehicle density is low. The RSUs can provide the pseudonym update service for vehicles that are running out of pseudonyms. Multiple pseudonym change mechanisms are available.
- Scenario 4: This area has a high vehicle density without RSUs. The vehicles can use the pseudonym change mechanism to change their pseudonyms through their cooperation.
4.2. Adversary Model
4.3. Security Requirements
- Anonymity: No adversary is able to extract the vehicle’s real identity from its pseudonym. The identities broadcast by vehicles are required to be anonymous within a set of potential vehicles, which ensures that no entities can obtain useful information about the real identity of vehicles. Moreover, anonymity is supposed to be conditional according to the security requirements of VANETs.
- Unlinkability: If the adversaries can obtain the messages sent by vehicles through monitoring, it is difficult to determine whether the consecutive received messages are sent by the same vehicle. In the pseudonym change protocol, no pseudonym should reveal any connections among vehicles.
- Mutual authentication: As the basic security requirement, mutual authentication focuses on identities and messages. Identity authentication means that the identity claimed by the entity is legal. Message authentication requires that the integrity of the message be able to be verified.
- Traceability: In a secure network architecture, it is essential to provide an efficient mechanism to trace the origin of the message. However, such a mechanism can only be effective under an authorized authority.
- Session key agreement: For data transmission, the confidentiality of the data is also a security requirement of VANETs. Therefore, after finishing the initial authentication, designing a session key agreement mechanism between entities in VANETs to encrypt the communication messages usually needs to be considered.
- Location privacy: Vehicle owners usually do not want their location to be exposed in sensitive areas. Consequently, vehicles need to change their identity information at specific areas, so that the adversaries cannot track the specific vehicle for a long time or obtain the driving trajectory.
- DoS attack resistance: The external adversaries are able to forge and broadcast a large number of invalid messages to consume the computational resource of the vehicles, which leads to legitimate messages possibly being dropped. As a result, it is necessary to ensure a low computational overhead for vehicles during communication.
4.4. System Initialization
- Let and be the additive group and multiplicative group, respectively, where for the same prime order p. P is the generator of . Let e be a bilinear pairing: .
- Six collision-resistant hash functions are defined: , , , , , .
- The TA chooses as the master key and as the key of the AES-256 encryption algorithm and computes the public key , .
4.5. Registration Protocol
4.5.1. Vehicle Registration Protocol
- The vehicle chooses session key and encrypts and to obtain , . Then, the vehicle sends to the TA for registration.
- The TA uses x to decrypt to obtain , . Then, the TA chooses and computes the corresponding pseudonyms , public keys , private keys , and the expiration , where , , .
- The TA utilizes to encrypt , , and and obtains = .
- Upon receiving the message from the TA, vehicle uses to decrypt to obtain , , and .
4.5.2. BS and RSU Registration Protocol
Protocol 1 Vehicle registration protocol. |
|
4.6. V2I Authentication and Pseudonym Issuance Protocols
4.6.1. V2I Authentication Protocol
- Vehicle v chooses , , and and signs message , , , , and to obtain signature , where , , , .
- The vehicle sends , , , , , and to the RSU.
- When receiving the message from the nearby v, the RSU first checks whether and are fresh. Then, the RSU computes h= and =. After that, the RSU checks whether holds. If the above equations are valid, the RSU believes v is legal. Otherwise, the message from the vehicle is discarded. The RSU signs , , , , and to obtain , where ∈, =, =, = . Finally, the RSU computes session key = and encrypts to obtain =.
- The RSU sends , , , , ,, and to v.
- Upon receiving the message from the RSU, v checks , and verifies the legality of through computing , , and checking . If the equation holds, computes and decrypts to obtain . If is legal, believes is legal, and the secure channel between and the RSU is established. Finally, v encrypts to obtain .
- Vehicle v sends to the RSU.
- The RSU decrypts and checks . If is valid, the RSU believes that the secure channel between the RSU and v is built.
Protocol 2 V2I authentication protocol. |
|
4.6.2. Pseudonym Issuance Protocol
Protocol 3 Pseudonym issuance protocol. |
|
- In order to apply for multiple temporary pseudonyms and certifications within the BS, vehicle v uses session key to encrypt request to obtain ciphertext .
- Vehicle v sends to the RSU.
- When obtaining the ciphertext from vehicle v, the RSU uses session key to decrypt to obtain the request . Then, the RSU uses the session key between the RSU and BS to encrypt , , , and and obtain .
- The RSU sends ciphertext to the BS.
- The BS decrypts and obtains , , , and . Then, multiple temporary pseudonyms , multiple random numbers , group key , and are selected and the private key , public key , and certificate are computed, whereThe BS sets the session key and encrypts , , , and to obtain ciphertext =. Finally, the BS stores , , , .
- The BS sends , , and to vehicle v via the RSU.
- After receiving the ciphertext from the BS, vehicle v computes the session key and decrypts to obtain the message from the BS. Finally, vehicle v stores , , , , , , and locally.
4.7. Pseudonym Change Protocol
- Vehicle selects pseudonym , public key , and certificate and computes signature , where is the current timestamp and is the pseudonym change request.
- Vehicle broadcasts , , , , , , , , and to other surrounding vehicles.
- When receiving the request from vehicle , the vehicle in the vicinity (e.g., ) checks the freshness of timestamp and the legality of signature . If the above verification is successful, updates the pseudonym certificate list and computes the ciphertext .
- When the current time and , broadcast the ciphertext to surrounding vehicles.
- Surrounding vehicles (including ) decrypt and add , , and into .
- Finally, if , all vehicles compute =, where , , and change pseudonym and certificate after .
Protocol 4 Pseudonym change protocol. |
|
4.8. Pseudonym Revocation Protocol
5. Performance Analysis
5.1. Computation Cost
5.2. Communication Cost
5.3. Simulation
5.3.1. Average Anonymous Set Size
5.3.2. User-Centric Location Privacy Level
6. Discussion
- Mac address change: PCP supports the pseudonym change in the application layer. However, according to the 1609.4 standard [38], in order to protect the full location privacy and security of the vehicle, it is necessary to propose an effective mechanism to support the change of MAC address. Otherwise, only the pseudonym is changed, and the adversaries can still be associated with the tracked vehicle through the MAC address.
- Beacon interval: According to DSRC, each vehicle periodically broadcasts a BSM every 100–300 milliseconds [39,40]. Thus, the period of pseudonym change has to be limited to the beacon interval. However, a long time interval may cause the vehicle to be unable to obtain the driving status of the surrounding vehicles in time, and a short time interval cannot guarantee that the vehicle has enough time to change its pseudonym through cooperation. It is vital for VANETs to support an efficient beacon strategy.
- Non-cooperative behavior: The cooperation among vehicles is a key factor for a successful pseudonym changing strategy. However, due to the costs that are involved in changing the pseudonym, some vehicles may not be willing to cooperate with other vehicles. Therefore, how to improve the willingness of vehicles to change pseudonyms and ensure that the pseudonyms can be changed at a high location privacy level need to be further researched.
7. Conclusions
Author Contributions
Funding
Informed Consent Statement
Conflicts of Interest
Appendix A. Security Analysis
Appendix A.1. Correctness
Appendix A.2. Formal Security Proof
Appendix A.3. Security Analysis
References
- Zhang, J.; Wang, F.-Y.; Wang, K.; Lin, W.-H.; Xu, X.; Chen, C. Data-Driven Intelligent Transportation Systems: A Survey. IEEE Trans. Intell. Transp. Syst. 2011, 12, 1624–1639. [Google Scholar] [CrossRef]
- Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
- IEEE Std 1609.0-2019 (Revision of IEEE Std 1609.0-2013); IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture. IEEE: Piscataway, NJ, USA, 10 April 2019; pp. 1–106.
- Rehman, O.; Qureshi, R.; Ould-Khaoua, M.; Niazi, M.F. Analysis of mobility speed impact on end-to-end communication performance in VANETs. Veh. Commun. 2020, 26, 100278. [Google Scholar] [CrossRef]
- Obaidat, M.; Shahwan, I.; Hassebo, A.; Obeidat, S.; Ali, M.; Khodjaeva, M. SNR-Based Early Warning Message Scheme for VANETs. J. Mob. Multimed. 2020, 162–190. [Google Scholar] [CrossRef]
- Zhang, M.; Ali, G.M.; Chong, P.H.; Seet, B.C.; Kumar, A. A Novel Hybrid MAC Protocol for Basic Safety Message Broadcasting in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4269–4282. [Google Scholar] [CrossRef]
- IEEE Std 1609.2.1-2020; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Certificate Management Interfaces for End Entities. IEEE: Piscataway, NJ, USA, 30 December 2020; pp. 1–287.
- Boualouache, A.; Senouci, S.-M.; Moussaoui, S. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks. IEEE Commun. Surv. Tutor. 2018, 20, 770–790. [Google Scholar] [CrossRef] [Green Version]
- Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Lagraa, N.; Ferrag, M.A. Pseudonym change-based privacy preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 2020, 55, 102618. [Google Scholar] [CrossRef]
- Freudiger, J.; Raya, M.; Felegyhazi, M.; Papadimitratos, P.; Hubaux, J.-P. Mix-zones for location privacy in vehicular networks. In Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, BC, Canada, 14 August 2007; pp. 1–7. [Google Scholar]
- Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. (Sherman) Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs. IEEE Trans. Veh. Technol. 2012, 61, 86–96. [Google Scholar] [CrossRef] [Green Version]
- Boualouache, A.; Senouci, S.-M.; Moussaoui, S. VLPZ: The vehicular location privacy zone. Procedia Comput. Sci. 2016, 83, 369–376. [Google Scholar] [CrossRef] [Green Version]
- Kang, J.; Yu, R.; Huang, X.; Zhang, Y. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2627–2637. [Google Scholar] [CrossRef] [Green Version]
- Li, X.; Zhang, H.; Ren, Y.; Ma, S.; Luo, B.; Weng, J.; Ma, J.; Huang, X. PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 2020, 7, 11789–11802. [Google Scholar] [CrossRef]
- Wang, S.; Yao, N. LIAP: A local identity-based anonymous message authentication protocol in VANETs. Comput. Commun. 2017, 112, 154–164. [Google Scholar] [CrossRef]
- Huang, L.; Matsuura, K.; Yamane, H.; Sezaki, K. Enhancing wireless location privacy using silent period. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; Volume 2, pp. 1187–1192. [Google Scholar]
- Sampigethaya, K.; Huang, L.; Li, M.; Poovendran, R.; Matsuura, K.; Sezaki, K. CARAVAN: Providing Location Privacy for VANET; Tech. Rep.; Washington Univ Seattle Dept of Electrical Engineering: Seattle, WA, USA, 2005. [Google Scholar]
- Benarous, L.; Kadri, B.; Boudjit, S. Alloyed Pseudonym Change Strategy for Location Privacy in VANETs. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Eckhoff, D.; Sommer, C.; Gansen, T.; German, R.; Dressler, F. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In Proceedings of the 2010 IEEE Vehicular Networking Conference, Jersey City, NJ, USA, 13–15 December 2010; pp. 174–181. [Google Scholar] [CrossRef]
- Buttyan, L.; Holczer, T.; Weimerskirch, A.; Whyte, W. SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
- Raya, M.; Hubaux, J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef] [Green Version]
- Pan, Y.; Li, J. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 2013, 36, 1599–1609. [Google Scholar] [CrossRef]
- Yu, R.; Kang, J.; Huang, X.; Xie, S.; Zhang, Y.; Gjessing, S. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 93–105. [Google Scholar] [CrossRef]
- Singh, P.K.; Gowtham, S.N.; S, T.; Nandi, S. CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs. Veh. Commun. 2019, 20, 100183. [Google Scholar] [CrossRef]
- Soleymani, S.A.; Goudarzi, S.; Anisi, M.H.; Zareei, M.; Abdullah, A.H.; Kama, N. A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh. Commun. 2021, 29, 100335. [Google Scholar] [CrossRef]
- Chaudhary, B.; Singh, K. A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-Netw. Appl. 2021, 14, 3198–3212. [Google Scholar] [CrossRef]
- Boneh, D.; Franklin, M. “Identity-Based Encryption from the Weil Pairing” in CRYPTO 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
- Cha, J.C.; Cheon, J.H. An Identity-Based Signature from Gap Diffie–Hellman Groups. In International Workshop on Practice and Theory in Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, January 2003. [Google Scholar]
- Lin, Q.; Yan, H.; Huang, Z.; Chen, W.; Shen, J.; Tang, Y. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access 2018, 6, 20632–20640. [Google Scholar] [CrossRef]
- Kenney, J.B. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
- Obaidat, M.; Khodjaeva, M.; Holst, J.; Ben Zid, M. Security and Privacy Challenges in Vehicular Ad Hoc Networks. In Connected Vehicles in the Internet of Things: Concepts, Technologies, and Frameworks for the IoV; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Fan, B.; Andersen, D.G.; Kaminsky, M.; Mitzenmacher, M.D. Cuckoo filter: Practically better than bloom. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Sydney, Australia, 2–5 December 2014; pp. 75–88. [Google Scholar]
- Boyen, X.; Martin, L. Identity-Based Cryptography Standard (IBCS) ♯1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems. Document RFC 5091. 2007. Available online: http://www.rfc.fr/rfc/en/rfc5091.pdf (accessed on 7 December 2021).
- Sommer, C.; German, R.; Dressler, F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef] [Green Version]
- Lynn, B.; Shacham, H.; Steiner, M.; Cooley, J.; Figueiredo, R.; Khazan, R.; Kosolapov, D.; Bethencourt, J.; Miller, P. The Pairing-Based Cryptography Library. Available online: https://crypto.stanford.edu/pbc/times.html (accessed on 5 January 2022).
- Haklay, M.; Weber, P. OpenStreetMap: User-generated street maps. IEEE Perva-Sive Comput. 2008, 7, 12–18. [Google Scholar] [CrossRef] [Green Version]
- Freudiger, J.; Manshaei, M.H.; Hubaux, J.; Parkes, D.C. Non-Cooperative Location Privacy. IEEE Trans. Dependable Secur. Comput. 2013, 10, 84–98. [Google Scholar] [CrossRef] [Green Version]
- IEEE Std 1609.4-2016/Cor 1-2019 (Corrigendum to IEEE Std 1609.4-2016); IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Multi-Channel Operation—Corrigendum 1: Miscellaneous Corrections. IEEE: Piscataway, NJ, USA, 17 October 2019; pp. 1–13.
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Tangade, S.; Manvi, S.; Lorenz, P. Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Trans. Veh. Technol. 2018, 67, 8647–8655. [Google Scholar] [CrossRef]
- Chuang, M.-C.; Lee, J.-F. SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. J. Syst. Softw. 2013, 86, 437–448. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
The real identity of entity A. | |
The ith pseudonym of the vehicle issued by the TA. Each vehicle owns n pseudonyms . | |
The public and private key pair of vehicle A’s pseudonym . | |
The ith pseudonym of the vehicle issued by the base station. Each vehicle owns w pseudonyms . | |
The session key between entity A and entity B. | |
The ith certification of generated by the base station. | |
The ith current timestamp. | |
The ith challenge value. | |
The expiration of the pseudonym. | |
The ith hash function. | |
Sign message M with the private key . | |
The signature generated by entity A. | |
Encrypt message M with the key K. | |
The ciphertext generated by entity A and the ciphertext sent to entity B. | |
The number of responses received by the vehicle when it sends a pseudonym change request. | |
, , | The start time, the end time of pseudonym broadcast, and the pseudonym change time, respectively. |
Algorithm | LIAP | SPA | PCP |
---|---|---|---|
RSU- | 2 | 3 | 3 |
RSU- | 5 + 3 | 3 + 3 | 2 + + |
V- | + 3 + | 3 | 3 |
V- | 4 + 2 | 3 + 3 | 2 + + |
Total | 10 + 10 + | 6 + 12 | 4 + 8 + 2 |
Parameters | Values |
---|---|
Simulation area | 2.6 km × 2.2 km |
Data Transmission Rate | 6 Mbps |
Transmission Power | 20 mW |
Noise Floor | −89 dBm |
BSM Interval | 1 s |
Simulation Time | 90 s (Simulation 1)/100 s (Simulation 2) |
Number of Cars (Simulation 1) | 5 (Scenarios 1, 3), 25 (Scenarios 2, 4) |
Number of Cars (Simulation 2) | 50, 100, 150 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Deng, X.; Gao, T.; Guo, N.; Zhao, C.; Qi, J. PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs. Entropy 2022, 24, 648. https://doi.org/10.3390/e24050648
Deng X, Gao T, Guo N, Zhao C, Qi J. PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs. Entropy. 2022; 24(5):648. https://doi.org/10.3390/e24050648
Chicago/Turabian StyleDeng, Xinyang, Tianhan Gao, Nan Guo, Cong Zhao, and Jiayu Qi. 2022. "PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs" Entropy 24, no. 5: 648. https://doi.org/10.3390/e24050648
APA StyleDeng, X., Gao, T., Guo, N., Zhao, C., & Qi, J. (2022). PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs. Entropy, 24(5), 648. https://doi.org/10.3390/e24050648