Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey - 2020

Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey

Research Area:  Vehicular Ad Hoc Networks

Abstract:

Vehicular Ad-hoc Networks (VANETs), which are a subclass of Mobile Ad-hoc Networks (MANETs), received a widespread attention during the last decades. With these promising set of safety applications, which are the main reason why they were developed, VANETs are considered as a tremendous support for the Intelligent Transportation Systems (ITS). However, several key issues remain to be solved before VANET becomes fully applicable; one of them being privacy preservation. To fulfill safety-requirements in VANETs, the vehicle needs to broadcast its status wirelessly. Consequently, any adversary can hear the broadcast messages at the aim of analyzing them, identifying, tracking and generating profile of his target. In other words, privacy of individuals may be seriously breached in VANETs if no safety measures were been taken. Using pseudonyms instead of the real identities of individuals, and changing them periodically during the communication is a promising solution for such crucial problems. There is a significant body of research work addressing this issue and a lot of researchers proposed various privacy protections basing on pseudonym change strategies. In this survey paper, we present an introduction to the privacy problem and give a recent and detailed state of the art of the different suggested pseudonym change strategies and approaches. We also propose a novel taxonomy to classify these strategies to diverse concepts. Finally, we discuss, give future directions and open issues and mention some of the observations that lead to better identify this problem for better future strategies.

Keywords:  

Author(s) Name:  Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag View in Scopus

Journal name:  Journal of Information Security and Applications

Conferrence name:  

Publisher name:  ELSEVIER

DOI:  10.1016/j.jisa.2020.102618

Volume Information:  Volume 55, December 2020, 102618