{"title":"一种实用的vanet中位置隐私的假名更改策略","authors":"Abdelwahab Boualouache, S. Moussaoui","doi":"10.1109/INDS.2014.20","DOIUrl":null,"url":null,"abstract":"Location privacy remains an open issue in VANETs. Although, frequently pseudonym changing is commonly accepted as solution to protect privacy in VANETs, many studies have been shown its weakness to provide the required level of privacy protection. In this paper, we propose a practical pseudonym changing strategy, called Silence & Swap at Signalized Intersection (S2SI). S2SI consists of two protocols, one for creating of safe silent mix zones and another for exchanging pseudonyms between vehicles under the control of RSUs within these zones. We evaluate the provided privacy protection of our strategy by developing anonymity set analytic model and by performing a simulative study of the strategy using the entropy of vehicles' anonymity set as the primary metric.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":"{\"title\":\"S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs\",\"authors\":\"Abdelwahab Boualouache, S. Moussaoui\",\"doi\":\"10.1109/INDS.2014.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Location privacy remains an open issue in VANETs. Although, frequently pseudonym changing is commonly accepted as solution to protect privacy in VANETs, many studies have been shown its weakness to provide the required level of privacy protection. In this paper, we propose a practical pseudonym changing strategy, called Silence & Swap at Signalized Intersection (S2SI). S2SI consists of two protocols, one for creating of safe silent mix zones and another for exchanging pseudonyms between vehicles under the control of RSUs within these zones. We evaluate the provided privacy protection of our strategy by developing anonymity set analytic model and by performing a simulative study of the strategy using the entropy of vehicles' anonymity set as the primary metric.\",\"PeriodicalId\":388358,\"journal\":{\"name\":\"2014 International Conference on Advanced Networking Distributed Systems and Applications\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"43\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advanced Networking Distributed Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDS.2014.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advanced Networking Distributed Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDS.2014.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs
Location privacy remains an open issue in VANETs. Although, frequently pseudonym changing is commonly accepted as solution to protect privacy in VANETs, many studies have been shown its weakness to provide the required level of privacy protection. In this paper, we propose a practical pseudonym changing strategy, called Silence & Swap at Signalized Intersection (S2SI). S2SI consists of two protocols, one for creating of safe silent mix zones and another for exchanging pseudonyms between vehicles under the control of RSUs within these zones. We evaluate the provided privacy protection of our strategy by developing anonymity set analytic model and by performing a simulative study of the strategy using the entropy of vehicles' anonymity set as the primary metric.