The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Impact of pseudonym changes on geographic routing in VANETs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
How to protect privacy in floating car data systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Measuring unlinkability revisited
Proceedings of the 7th ACM workshop on Privacy in the electronic society
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
A location privacy metric for V2X communication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Mobile Networks and Applications
Wireless location privacy protection in vehicular ad-hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Measuring long-term location privacy in vehicular communication systems
Computer Communications
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Distributed certificate and application architecture for VANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Formal analysis of privacy for vehicular mix-zones
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Short paper: a practical view of "mixing" identities in vehicular networks
Proceedings of the fourth ACM conference on Wireless network security
Multi-objective optimal combination queries
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A survey on privacy problems and solutions for VANET based on network model
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
VeSPA: vehicular security and privacy-preserving architecture
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Journal of Network and Computer Applications
How to build vehicular ad-hoc networks on smartphones
Journal of Systems Architecture: the EUROMICRO Journal
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some privacy risk by making it easier to track the physical location of vehicles. One approach to solve this problem is that the vehicles use pseudonyms that they change with some frequency. In this paper, we study the effectiveness of this approach. We define a model based on the concept of the mix zone, characterize the tracking strategy of the adversary in this model, and introduce a metric to quantify the level of privacy enjoyed by the vehicles. We also report on the results of an extensive simulation where we used our model to determine the level of privacy achieved in realistic scenarios. In particular, in our simulation, we used a rather complex road map, generated traffic with realistic parameters, and varied the strength of the adversary by varying the number of her monitoring points. Our simulation results provide detailed information about the relationship between the strength of the adversary and the level of privacy achieved by changing pseudonyms.