Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2021

07-01-2021

A location privacy protection scheme for convoy driving in autonomous driving era

Authors: Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin

Published in: Peer-to-Peer Networking and Applications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Convoy driving has great potential in the development of autonomous driving industry, which can bring great improvement to the utilization rate of roads and the travel experience of passengers. However, the emergence of convoy driving also brings some new challenges to the location privacy of autonomous vehicles. In this paper, a novel dynamic mixed zone establishment scheme is proposed to protect the location privacy of autonomous vehicles in convoy driving context. As the convoy is a closed group, the request for the establishment of the mix zone will be broadcast first within the convoy, followed by outside the convoy. In order to prevent pseudonym syntactic join attacks within the convoy, the proposed scheme allows autonomous vehicles to use multiple valid pseudonyms if only itself change the pseudonym in the convoy. In order to trace the real identity of the offending vehicle, the proposed scheme specifies the distribution method of the pseudonym, the legitimate vehicle can trace the real identity of the offending vehicle by submitting the pseudonym of the offending vehicle. Compared with the scheme to protect location privacy in the traditional vehicular network, the proposed scheme has less overhead and a higher level of security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Davies A (2018) The wired guide to self-driving cars. Wired, 1–13 Davies A (2018) The wired guide to self-driving cars. Wired, 1–13
2.
go back to reference Mohamad N M V, Ambastha P, Gautam S, Jain R, Subramaniyam H, Muthukaruppan L (2020) Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. Peer-to-Peer Networking and Applications, 1–9 Mohamad N M V, Ambastha P, Gautam S, Jain R, Subramaniyam H, Muthukaruppan L (2020) Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. Peer-to-Peer Networking and Applications, 1–9
3.
go back to reference Ale L, Zhang N, Wu H, Chen D, Han T (2019) Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet of Things Journal 6(3):5520–5530CrossRef Ale L, Zhang N, Wu H, Chen D, Han T (2019) Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet of Things Journal 6(3):5520–5530CrossRef
4.
go back to reference Zhang N, Yang P, Zhang S, Chen D, Zhuang W, Liang B, Shen X S (2017) Software defined networking enabled wireless network virtualization: Challenges and solutions. IEEE Netw 31(5):42–49CrossRef Zhang N, Yang P, Zhang S, Chen D, Zhuang W, Liang B, Shen X S (2017) Software defined networking enabled wireless network virtualization: Challenges and solutions. IEEE Netw 31(5):42–49CrossRef
5.
go back to reference Ma Y, Wang Z, Yang H (2020) Artificial intelligence applications in the development of autonomous vehicles: A survey[J]. IEEE/CAA Journal of Automatica Sinica 7(2):315–329CrossRef Ma Y, Wang Z, Yang H (2020) Artificial intelligence applications in the development of autonomous vehicles: A survey[J]. IEEE/CAA Journal of Automatica Sinica 7(2):315–329CrossRef
6.
go back to reference Kebria P, Khosravi A, Salaken S (2019) Deep imitation learning for autonomous vehicles based on convolutional neural networks[J]. IEEE/CAA Journal of Automatica Sinica 7(1):82–95CrossRef Kebria P, Khosravi A, Salaken S (2019) Deep imitation learning for autonomous vehicles based on convolutional neural networks[J]. IEEE/CAA Journal of Automatica Sinica 7(1):82–95CrossRef
7.
go back to reference Gao S, Zhou M, Wang Y (2018) Dendritic neuron model with effective learning algorithms for classification, approximation, and prediction[J]. IEEE Trans Neural Netw Learning Sys 30(2):601–614CrossRef Gao S, Zhou M, Wang Y (2018) Dendritic neuron model with effective learning algorithms for classification, approximation, and prediction[J]. IEEE Trans Neural Netw Learning Sys 30(2):601–614CrossRef
8.
go back to reference Hobert L, Festag A, Llatser I, Altomare L, Visintainer F, Kovacs A (2015) Enhancements of V2X communication in support of cooperative autonomous driving. IEEE Commun Mag 53(12):64–70CrossRef Hobert L, Festag A, Llatser I, Altomare L, Visintainer F, Kovacs A (2015) Enhancements of V2X communication in support of cooperative autonomous driving. IEEE Commun Mag 53(12):64–70CrossRef
9.
go back to reference Calmettes T, Michel M, Damien S (2017) Driving vehicles in convoy. U.S. Patent No. 9,786,182. 10 Oct. 2017 Calmettes T, Michel M, Damien S (2017) Driving vehicles in convoy. U.S. Patent No. 9,786,182. 10 Oct. 2017
10.
go back to reference Khan MA, Boloni L (2005) Convoy driving through ad-hoc coalition formation. In: 11th IEEE real time and embedded technology and applications symposium, pp 98–105 Khan MA, Boloni L (2005) Convoy driving through ad-hoc coalition formation. In: 11th IEEE real time and embedded technology and applications symposium, pp 98–105
11.
go back to reference Llatser I, Jornod G, Festag A, Mansolino D, Navarro I, Martinoli A (2017) Simulation of cooperative automated driving by bidirectional coupling of vehicle and network simulators. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp 1881–1886 Llatser I, Jornod G, Festag A, Mansolino D, Navarro I, Martinoli A (2017) Simulation of cooperative automated driving by bidirectional coupling of vehicle and network simulators. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp 1881–1886
12.
go back to reference Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X S (2018) Synergy of big data and 5g wireless networks: Opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12–18CrossRef Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X S (2018) Synergy of big data and 5g wireless networks: Opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12–18CrossRef
13.
go back to reference Zhang N, Lu N, Cheng N, Mark J W, Shen X S (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Sel Areas Commun 31(11):2453–2464CrossRef Zhang N, Lu N, Cheng N, Mark J W, Shen X S (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Sel Areas Commun 31(11):2453–2464CrossRef
14.
go back to reference Green D, Karl C, Faber F (2015) Cooperative intelligent transport systems (C-ITS) standards assessment, No. AP-R474/15 Green D, Karl C, Faber F (2015) Cooperative intelligent transport systems (C-ITS) standards assessment, No. AP-R474/15
15.
go back to reference Marjovi A, Vasic M, Lemaitre J, Martinoli A (2015) Distributed graph-based convoy control for networked intelligent vehicles. In: 2015 IEEE Intelligent Vehicles Symposium (IV), pp 138–143 Marjovi A, Vasic M, Lemaitre J, Martinoli A (2015) Distributed graph-based convoy control for networked intelligent vehicles. In: 2015 IEEE Intelligent Vehicles Symposium (IV), pp 138–143
16.
go back to reference Skottke E M, Debus G, Wang L, Huestegge L (2014) Carryover effects of highly automated convoy driving on subsequent manual driving performance. Human Factors 56(7):1272–1283CrossRef Skottke E M, Debus G, Wang L, Huestegge L (2014) Carryover effects of highly automated convoy driving on subsequent manual driving performance. Human Factors 56(7):1272–1283CrossRef
17.
go back to reference Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer Peer Netw Appl 12(5):1178–1193CrossRef Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer Peer Netw Appl 12(5):1178–1193CrossRef
19.
go back to reference Hadian M, Altuwaiyan T, Liang X, Zhu H (2019) Privacy-preserving task scheduling for time-sharing services of autonomous vehicles. IEEE Trans Veh Technol 68(6):5260–5270CrossRef Hadian M, Altuwaiyan T, Liang X, Zhu H (2019) Privacy-preserving task scheduling for time-sharing services of autonomous vehicles. IEEE Trans Veh Technol 68(6):5260–5270CrossRef
20.
go back to reference Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans Intell Transpo Syst 18(11):2898–2915CrossRef Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans Intell Transpo Syst 18(11):2898–2915CrossRef
21.
go back to reference Zhou L, Yu L, Du S, Zhu H, Chen C (2018) Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal 6(3):4472–4481CrossRef Zhou L, Yu L, Du S, Zhu H, Chen C (2018) Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal 6(3):4472–4481CrossRef
22.
go back to reference Deng E, Zhang H, Wu P, Guo F, Liu Z, Zhu H, Cao Z (2019) Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Information Sciences 504:354–371CrossRef Deng E, Zhang H, Wu P, Guo F, Liu Z, Zhu H, Cao Z (2019) Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Information Sciences 504:354–371CrossRef
23.
go back to reference Ardagna C, Cremonini M, Damiani E (2007) Location privacy protection through obfuscation-based techniques[C]. In: IFIP Annual conference on data and applications security and privacy. Springer, Heidelberg, pp 47–60 Ardagna C, Cremonini M, Damiani E (2007) Location privacy protection through obfuscation-based techniques[C]. In: IFIP Annual conference on data and applications security and privacy. Springer, Heidelberg, pp 47–60
24.
go back to reference Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services[C]. Proceedings of the 16th ACM conference on computer and communications security, pp 348–357 Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services[C]. Proceedings of the 16th ACM conference on computer and communications security, pp 348–357
25.
go back to reference Miyazawa M, Tanabe H, Yamane M, Sen N, Yashima J, Nakahama H, Ishiyama M, Hiroma T (2019) Convoy travel control apparatus. U.S. Patent 10,262,541[P]. 2019-4-16 Miyazawa M, Tanabe H, Yamane M, Sen N, Yashima J, Nakahama H, Ishiyama M, Hiroma T (2019) Convoy travel control apparatus. U.S. Patent 10,262,541[P]. 2019-4-16
26.
go back to reference Chen D, Zhang N, Lu R, Cheng N, Zhang K, Qin Z (2018) Channel precoding based message authentication in wireless networks: Challenges and solutions. IEEE Netw 33(1):99–105CrossRef Chen D, Zhang N, Lu R, Cheng N, Zhang K, Qin Z (2018) Channel precoding based message authentication in wireless networks: Challenges and solutions. IEEE Netw 33(1):99–105CrossRef
27.
go back to reference Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748–761CrossRef Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748–761CrossRef
28.
go back to reference Mo R, Ma J, Liu X, Liu H (2018) EOABS: Expressive outsourced attribute-based signature. Peer Peer Netw Appl 11(5):979–988CrossRef Mo R, Ma J, Liu X, Liu H (2018) EOABS: Expressive outsourced attribute-based signature. Peer Peer Netw Appl 11(5):979–988CrossRef
29.
go back to reference Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili S F (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Netw Appl 12(1):43–59CrossRef Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili S F (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Netw Appl 12(1):43–59CrossRef
30.
go back to reference Chen D, Zhang N, Qin Z, Mao X, Qin Z, Shen X, Li X Y (2016) S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal 4(1):88–100CrossRef Chen D, Zhang N, Qin Z, Mao X, Qin Z, Shen X, Li X Y (2016) S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal 4(1):88–100CrossRef
31.
go back to reference Teramoto T, Matsuura S, Kakiuchi M, Inomata A, Fujikawa K (2013) Location tracking prevention with dummy messages for vehicular communications. In: 2013 13th International Conference on ITS Telecommunications (ITST), pp 56–61 Teramoto T, Matsuura S, Kakiuchi M, Inomata A, Fujikawa K (2013) Location tracking prevention with dummy messages for vehicular communications. In: 2013 13th International Conference on ITS Telecommunications (ITST), pp 56–61
32.
go back to reference Pan X, Xu J, Meng X (2011) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef Pan X, Xu J, Meng X (2011) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef
33.
go back to reference Palanisamy B, Liu L (2011) Mobimix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International conference on data engineering, pp 494–505 Palanisamy B, Liu L (2011) Mobimix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International conference on data engineering, pp 494–505
34.
go back to reference Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol 2, pp 1187–1192 Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol 2, pp 1187–1192
35.
go back to reference Buttyn L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: 2009 IEEE Vehicular Networking Conference (VNC), pp 1–8 Buttyn L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: 2009 IEEE Vehicular Networking Conference (VNC), pp 1–8
36.
go back to reference Song J-H, Wong VWS, Leung VCM (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mob Netw Appl 15(1):160–171CrossRef Song J-H, Wong VWS, Leung VCM (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mob Netw Appl 15(1):160–171CrossRef
37.
go back to reference Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631–5641CrossRef Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631–5641CrossRef
38.
go back to reference Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: Providing location privacy for VANET. Washington Univ Seattle Dept of Electrical Engineering Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: Providing location privacy for VANET. Washington Univ Seattle Dept of Electrical Engineering
39.
go back to reference Kang J, Yu R, Huang X (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles[J]. IEEE Wirel Commun 23(5):52–59CrossRef Kang J, Yu R, Huang X (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles[J]. IEEE Wirel Commun 23(5):52–59CrossRef
40.
go back to reference Petit J, Schaub F, Feiri M (2017) Pseudonym schemes in vehicular networks: A survey[J]. IEEE Commun Surv Tutor 17(1):228–255CrossRef Petit J, Schaub F, Feiri M (2017) Pseudonym schemes in vehicular networks: A survey[J]. IEEE Commun Surv Tutor 17(1):228–255CrossRef
41.
go back to reference Tsang P P, Kapadia A, Cornelius C, Smith S W (2009) Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans Dependable Secure Comput 8(2):256–269CrossRef Tsang P P, Kapadia A, Cornelius C, Smith S W (2009) Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans Dependable Secure Comput 8(2):256–269CrossRef
42.
43.
go back to reference He D, Zeadally S, Xu B (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Trans Info Forensics Sec 10(12):2681–2691CrossRef He D, Zeadally S, Xu B (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Trans Info Forensics Sec 10(12):2681–2691CrossRef
44.
go back to reference Bai L, Zhang Y, Yang G (2012) SM2 cryptographic algorithm based on discrete logarithm problem and prospect[C]. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, pp 1294–1297 Bai L, Zhang Y, Yang G (2012) SM2 cryptographic algorithm based on discrete logarithm problem and prospect[C]. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, pp 1294–1297
45.
go back to reference Du S, Zhu H, Li X, Ota K, Dong M (2013) Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. EEE Trans Veh Technol 62(9):4565–4575CrossRef Du S, Zhu H, Li X, Ota K, Dong M (2013) Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. EEE Trans Veh Technol 62(9):4565–4575CrossRef
47.
go back to reference Pigatto D, da Silva N, Branco K (2011) Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries[J]. J Appl Comput Res 1 (2):95–103 Pigatto D, da Silva N, Branco K (2011) Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries[J]. J Appl Comput Res 1 (2):95–103
Metadata
Title
A location privacy protection scheme for convoy driving in autonomous driving era
Authors
Xin Ye
Jin Zhou
Yuedi Li
Mingsheng Cao
Dajiang Chen
Zhiguang Qin
Publication date
07-01-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01034-w

Other articles of this Issue 3/2021

Peer-to-Peer Networking and Applications 3/2021 Go to the issue

Premium Partner