2018
DOI: 10.1002/dac.3704
|View full text |Cite
|
Sign up to set email alerts
|

Distance and clustering‐based energy‐efficient pseudonyms changing strategy over road network

Abstract: Summary To improve the fairness, the energy consumption changing pseudonyms needs to be taken into account. Existing works focus on changing velocity‐based pseudonyms changing strategy and short changes interval with limited coverage, but due to similar velocity and short changes, internal attacker guesses easily known communication and location information due to location information of vehicle on tracking, which may expose adversary private information, and frequently, pseudonyms changing occurs due to movem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 57 publications
(119 reference statements)
0
13
0
Order By: Relevance
“…(1) On location privacy enhanced schemes, the existing trust management systems encounter false negative rates and high false positive in identifying malicious vehicles and determining which message is trustworthy. [4][5][6][7][8] There is a dilemma between ensuring traffic safety and protecting the privacy of drivers in road networks. (2) In a multi-hop event scenario, if adversaries forward contradicting opinions earlier to trustworthy vehicles, then the honest vehicle may be misled.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…(1) On location privacy enhanced schemes, the existing trust management systems encounter false negative rates and high false positive in identifying malicious vehicles and determining which message is trustworthy. [4][5][6][7][8] There is a dilemma between ensuring traffic safety and protecting the privacy of drivers in road networks. (2) In a multi-hop event scenario, if adversaries forward contradicting opinions earlier to trustworthy vehicles, then the honest vehicle may be misled.…”
Section: Discussionmentioning
confidence: 99%
“…Further, broadcasting messages are transmitted in high frequency, and in plain text with digital signatures for ensuring the non‐repudiation of the transmitted message. In order to provide privacy in road network, pseudonyms are used while vehicles are trusted . The pseudonyms make it difficult to link the vehicle‐movement pattern together.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations