2018
DOI: 10.1002/dac.3795
|View full text |Cite
|
Sign up to set email alerts
|

MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy

Abstract: Summary In intelligent transportation systems, the messages transmitted and received from one vehicle to another vehicle may enhance location privacy scheme; falsification message forwarding collusion attack, timing, and transition attacks all are serious issues and must be addressed in event trust management. Without which, decision making on event message may endanger the whole transportation system and may even threat the human life. In addition, pseudonym expiry is another critical issue of location privac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 61 publications
0
7
0
Order By: Relevance
“…Fog computing is a highly virtualized platform that provides compute, storage, and networking services between end devices and traditional Cloud computing data centers offering low latency and location awareness, geographical distribution, mobility support, interoperability, and real-time interactions [2]. These attributes make fog computing the appropriate platform that meets all VANET scenarios' requirements [5,6]. However, as the number of vehicles increases, so does the amount of data generated by these vehicles.…”
Section: Iot Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Fog computing is a highly virtualized platform that provides compute, storage, and networking services between end devices and traditional Cloud computing data centers offering low latency and location awareness, geographical distribution, mobility support, interoperability, and real-time interactions [2]. These attributes make fog computing the appropriate platform that meets all VANET scenarios' requirements [5,6]. However, as the number of vehicles increases, so does the amount of data generated by these vehicles.…”
Section: Iot Architecturementioning
confidence: 99%
“…These updates are very costly in many ways. Each update leads to increased bandwidth usage, packet advancement delay, and increased collision risk in the media access layer [5]. Packet collision will cause packet loss, affecting routing efficiency, and, consequently, a crowded condition occurs when the channel is used by vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…In addition,the untrusted LBS server can also obtain all the information about the service requester vehicle [11]. Memo et al [12] proposed a new hybrid zone and dynamic pseudonym trust management system, designed to prevent attackers from under privacy-enhanced road networks. When the pseudonym is expired, the dynamic pseudonym trust management system is proposed with the help of the report server, and a series of simulations are carried out under many trust attack models.…”
Section: B Motivationmentioning
confidence: 99%
“…to construct the cloaked region by Eq (11) and Eq (12). After the dummy locations are generated, it is merged with L into candidate anonymous group I.…”
mentioning
confidence: 99%
“…Finally, we have not discussed how technical solutions currently available (e.g., [45]) could be adapted to support the implementation of GDPR. Guidelines about technical solutions which are in line with GDPR's requirements (or strategies to fine-tune them for the goals of GDPR) are also an important aspect which could ease the life of developers but exploring them was beyond the scope of this study.…”
Section: Limitationsmentioning
confidence: 99%