What is it about?
This paper addresses the privacy risks associated with Vehicular Ad Hoc Networks (VANETs), where vehicles exchange information to ensure user safety. Although VANETs are essential for safety applications, they also pose privacy risks as vehicles periodically broadcast sensitive spatiotemporal data that can be intercepted by attackers. The paper proposes a hybrid pseudonym change strategy that maintains the necessary safety features while preserving user location privacy. The strategy uses two methods: hiding within the crowd in densely populated areas and obfuscation in less populated areas to confuse attackers and prevent the linking of vehicle identities.
Featured Image
Photo by phyo min on Unsplash
Why is it important?
Location privacy is a critical concern in VANETs, as attackers can exploit the exchange of real-time data to track and potentially harm individuals. The proposed solution is crucial because it allows vehicles to maintain their privacy while still fulfilling their safety functions. By using a hybrid approach, the system effectively tackles the challenge of protecting location privacy, especially in varying traffic conditions, making it more robust against potential attacks. This solution is key to the practical deployment of VANETs in the real world, where privacy and safety must be balanced.
Perspectives
The proposed strategy marks an important step in advancing the privacy of users in VANETs without compromising their safety. As the deployment of connected vehicles continues to grow, the need for privacy-preserving solutions like this one will only increase. The approach demonstrated in this paper offers a solid foundation for future research and could lead to more secure and privacy-aware VANET infrastructures.
Leila BENAROUS
University of Laghouat
Read the Original
This page is a summary of: Hybrid pseudonym change strategy for location privacy in VANET: protecting location privacy in VANET, International Journal of Information Privacy Security and Integrity, January 2020, Inderscience Publishers,
DOI: 10.1504/ijipsi.2020.111455.
You can read the full text:
Contributors
The following have contributed to this page







