Proceedings of the 8th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2015
DOI: 10.1145/2766498.2766520
|View full text |Cite
|
Sign up to set email alerts
|

A framework for evaluating pseudonym strategies in vehicular ad-hoc networks

Abstract: The standard approach to privacy-friendly authentication in vehicular ad-hoc networks is the use of pseudonym certificates. The level of location privacy users can enjoy under the threat of an attacker depends on the attacker's coverage and strategy as well as on the users' strategy for changing their pseudonym certificates.With this paper, we propose a generic framework for evaluation and comparison of different pseudonym change strategies with respect to the privacy level they provide under the threat of a r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…[35][82] [83][84] [85]) and techniques (e.g. [86][87] [88][89] [90]) have been proposed to evaluate the achieved level of location privacy protection in VANETs. However, finding an unified framework and a comprehensible metric to evaluate and compare pseudonym changing strategies is not yet achieved.…”
Section: Evaluation Metrics and Techniquesmentioning
confidence: 99%
“…[35][82] [83][84] [85]) and techniques (e.g. [86][87] [88][89] [90]) have been proposed to evaluate the achieved level of location privacy protection in VANETs. However, finding an unified framework and a comprehensible metric to evaluate and compare pseudonym changing strategies is not yet achieved.…”
Section: Evaluation Metrics and Techniquesmentioning
confidence: 99%
“…Our this work, we propose VPL x to denote the level of vehicle node x,(x = 1,2,….,n) to the number of the vehicle nodes to CH. [46][47][48][49][50][51][52][53] The pseudonyms changing vehicle node obviously consider distance and traffic from other vehicle nodes to CH by way of it or not. Pseudonyms changing of node x is P x , PC is for the number of the pseudonyms changing vehicle to transfer their traffic information by way of distance to the CH, then the pseudonyms changing of node x is calculated by…”
Section: Clustering Protocolsmentioning
confidence: 99%