Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

18.11.2020

Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks

verfasst von: Imran Memon, Hina Memon, Qasim Ali Arain

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Memon, I., Arain, Q. A., Memon, M. H., et al. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30(16), 3312.CrossRef Memon, I., Arain, Q. A., Memon, M. H., et al. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30(16), 3312.CrossRef
2.
Zurück zum Zitat Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRef Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRef
3.
Zurück zum Zitat Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless personal communications, 79, 647–660.CrossRef Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless personal communications, 79, 647–660.CrossRef
4.
Zurück zum Zitat Memon, I. (2015a). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRef Memon, I. (2015a). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRef
5.
Zurück zum Zitat Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 1–34. Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 1–34.
6.
Zurück zum Zitat Das, A. K. (2015). A secure and effective biometric based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems, 30(1), e2993. Das, A. K. (2015). A secure and effective biometric based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems, 30(1), e2993.
7.
Zurück zum Zitat Memon, I., & Memon, H. (2017). An effective and secure user authenticated protocol for location based services in road networks. arXiv preprint arXiv:1706.02646. Memon, I., & Memon, H. (2017). An effective and secure user authenticated protocol for location based services in road networks. arXiv preprint arXiv:1706.02646.
8.
Zurück zum Zitat Memon, I. (2018). Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems, 31(11), e3704.CrossRef Memon, I. (2018). Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems, 31(11), e3704.CrossRef
9.
Zurück zum Zitat Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95(4), 3713–3732.CrossRef Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95(4), 3713–3732.CrossRef
10.
Zurück zum Zitat Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and communication networks, 6, 777–789.CrossRef Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and communication networks, 6, 777–789.CrossRef
11.
Zurück zum Zitat Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80, 1347–1362.CrossRef Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80, 1347–1362.CrossRef
12.
Zurück zum Zitat Arain, Q. A., Zhongliang, D., Memon, I., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–522.CrossRef Arain, Q. A., Zhongliang, D., Memon, I., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95(2), 505–522.CrossRef
13.
Zurück zum Zitat Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking, 22, 391–404.CrossRef Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking, 22, 391–404.CrossRef
14.
Zurück zum Zitat Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef
15.
Zurück zum Zitat Talipov, E., Shin, H., Han, S., & Cha, H. (2011). A lightweight stateful address autoconfiguration for 6LoWPAN. Wireless Networks, 17, 183–197.CrossRef Talipov, E., Shin, H., Han, S., & Cha, H. (2011). A lightweight stateful address autoconfiguration for 6LoWPAN. Wireless Networks, 17, 183–197.CrossRef
16.
Zurück zum Zitat Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 11(1), 1–22.CrossRef Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 11(1), 1–22.CrossRef
17.
Zurück zum Zitat Mishra, D., Chaturvedi, A., & Mukhopadhyay, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.CrossRef Mishra, D., Chaturvedi, A., & Mukhopadhyay, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.CrossRef
18.
Zurück zum Zitat Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure IPv6 address configuration protocol for vehicular networks. Wireless personal communications, 79, 721–744.CrossRef Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure IPv6 address configuration protocol for vehicular networks. Wireless personal communications, 79, 721–744.CrossRef
19.
Zurück zum Zitat X. Wu, K. N. Brown, C. J. Sreenan, P. Alvarez, M. Ruffini, N. Marchetti, et al., "An XG-PON module for the NS-3 network simulator," in Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013, pp. 195–202. X. Wu, K. N. Brown, C. J. Sreenan, P. Alvarez, M. Ruffini, N. Marchetti, et al., "An XG-PON module for the NS-3 network simulator," in Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013, pp. 195–202.
20.
Zurück zum Zitat Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless personal communications, 74, 731–755.CrossRef Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless personal communications, 74, 731–755.CrossRef
21.
Zurück zum Zitat Chen, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63, 407–426.CrossRef Chen, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63, 407–426.CrossRef
22.
Zurück zum Zitat Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications, 77, 197–224.CrossRef Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications, 77, 197–224.CrossRef
23.
Zurück zum Zitat Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation in VANET. Wireless personal communications, 72, 315–341.CrossRef Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation in VANET. Wireless personal communications, 72, 315–341.CrossRef
24.
Zurück zum Zitat Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.CrossRef Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.CrossRef
25.
Zurück zum Zitat Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.CrossRef Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.CrossRef
31.
Zurück zum Zitat Yan, Y., Zhang, B., Zheng, J., & Ma, J. (2010). CORE: A coding-aware opportunistic routing mechanism for wireless mesh networks [Accepted from Open Call]. IEEE Wireless Communications, 17(3), 96–103.CrossRef Yan, Y., Zhang, B., Zheng, J., & Ma, J. (2010). CORE: A coding-aware opportunistic routing mechanism for wireless mesh networks [Accepted from Open Call]. IEEE Wireless Communications, 17(3), 96–103.CrossRef
32.
Zurück zum Zitat J. Manssour, A. Osseiran and S. B. Slimane, (2009). Opportunistic relay selection for wireless networkcoding, Communications (MICC), IEEE 9th Malaysia International Conference on, Kuala Lumpur, pp.102–106 J. Manssour, A. Osseiran and S. B. Slimane, (2009). Opportunistic relay selection for wireless networkcoding, Communications (MICC), IEEE 9th Malaysia International Conference on, Kuala Lumpur, pp.102–106
33.
Zurück zum Zitat Zhang, J., Chen, Y. P., & Marsic, I. (2010). MAC-layer proactive mixing for network coding inmulti-hop wireless networks. Computer Networks, 54(2), 196–207.CrossRef Zhang, J., Chen, Y. P., & Marsic, I. (2010). MAC-layer proactive mixing for network coding inmulti-hop wireless networks. Computer Networks, 54(2), 196–207.CrossRef
Metadaten
Titel
Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks
verfasst von
Imran Memon
Hina Memon
Qasim Ali Arain
Publikationsdatum
18.11.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07854-6

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt