Open Access Open Access  Restricted Access Subscription Access

An Effective Entropy Based Pseudonym Management System for Vehicular Ad Hoc Networks


Affiliations
1 Department of Computer Science, SNGC, Chavadi, Coimbatore-641105, Tamilnadu, India
 

Objectives: The main objective of method is to optimize the utilization of pseudonym resources and improve the privacy in VANET.

Methods: There are different techniques based on pseudonyms used to improve privacy in VANET. One of such method utilizes minimum spanning tree algorithm and entropy based pseudonym shuffling process to improve the privacy with minimum transmission loss.

Findings: The anonymity through pseudonym techniques in VANET is one of the major responsibilities to degrade the transmission performance. The transmission cost of pseudonym is not considered during pseudonym distribution to Road Side Units (RSU). Therefore, an effective pseudonym management system is required for minimizing transmission cost of pseudonyms and increasing privacy.

Application/Improvements: To overcome transmission cost of pseudonyms, Esau-Williams (EW) algorithm and entropy based pseudonym shuffling process are introduced for anonymity.


Keywords

Vehicular Ad-Hoc Network (VANET), Anonymity, Pseudonym Management System, Minimum Spanning Tree, Esau-Williams (EW) Algorithm, Entropy.
User
Notifications

  • A. Prasanna, R. Asha. An Improved Selfish Node Detection in the Mobile Adhoc Network with the Consideration of Malicious Nodes Present in the Network. Indian Journal of Innovations and Developments.2015; 4(4), 1-6.
  • D. Jiang, L. Delgrossi. IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, 2008, 2036-2040.
  • M. Raya, J. P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 2007; 15(1), 39-68.
  • E. Fonseca, A. Festag, R. Baldessari, R. L. Aguiar. Support of anonymity in vanets-putting pseudonymity into practice. In 2007 IEEE Wireless Communications and Networking Conference. IEEE, 2007, 3400-3405.
  • D. Förster, F. Kargl, H. Löhr. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In 2014 IEEE Vehicular Networking Conference (VNC). IEEE, 2014, 25-32.
  • S. Mathews. An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet. In Electronics and Communication Systems (ICECS), 2014 International Conference on IEEE.2014, 1-6.
  • B. Liu, Y. Zhong, S. Zhang. Probabilistic isolation of malicious vehicles in pseudonym changing VANETs. In Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on. 2007, 967-972.
  • J. Liao, J. Li. Effectively changing pseudonyms for privacy protection in vanets. In 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. IEEE. 2009, 648-652.
  • D. Wang, D. Li, X. Li, Z. Xiao. An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on IEEE. 2015, 763-767.
  • U. Rajput, F. Abbas, H. Eun, R. Hussain, H. Oh. A two level privacy preserving pseudonymous authentication protocol for VANET. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on IEEE. 2015, 643-650.
  • W. Ying, Y. Shiyong. Protecting Location Privacy via Synchronously Pseudonym Changing in VANETs. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on IEEE. 2014, 644-648.
  • A. Adigun, B. A. Bensaber, I. Biskri. Protocol of change pseudonyms for VANETs. In Local Computer Networks Workshops (LCN Workshops), 2013 IEEE 38th Conference on IEEE. 2013, 162-167.
  • Y. Pan, J. Li, L. Feng, B. Xu. An analytical model for random changing pseudonyms scheme in VANETs. In Network Computing and Information Security (NCIS), 2011 International Conference on IEEE. 2011, 2, 141-145.
  • H. Artail, N. Abbani. A pseudonym management system to achieve anonymity in vehicular Ad hoc networks. IEEE Transactions on Dependable and Secure Computing, 2016, 13(1), 106-119.
  • X. Huang, J. Kang, R. Yu, M. Wu, Y. Zhang, S. Gjessing. A Hierarchical Pseudonyms Management Approach for Software-Defined Vehicular Networks. In Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd, 2016, 1-5.

Abstract Views: 257

PDF Views: 0




  • An Effective Entropy Based Pseudonym Management System for Vehicular Ad Hoc Networks

Abstract Views: 257  |  PDF Views: 0

Authors

T. Sivakumar
Department of Computer Science, SNGC, Chavadi, Coimbatore-641105, Tamilnadu, India
A. S. Nidhin
Department of Computer Science, SNGC, Chavadi, Coimbatore-641105, Tamilnadu, India

Abstract


Objectives: The main objective of method is to optimize the utilization of pseudonym resources and improve the privacy in VANET.

Methods: There are different techniques based on pseudonyms used to improve privacy in VANET. One of such method utilizes minimum spanning tree algorithm and entropy based pseudonym shuffling process to improve the privacy with minimum transmission loss.

Findings: The anonymity through pseudonym techniques in VANET is one of the major responsibilities to degrade the transmission performance. The transmission cost of pseudonym is not considered during pseudonym distribution to Road Side Units (RSU). Therefore, an effective pseudonym management system is required for minimizing transmission cost of pseudonyms and increasing privacy.

Application/Improvements: To overcome transmission cost of pseudonyms, Esau-Williams (EW) algorithm and entropy based pseudonym shuffling process are introduced for anonymity.


Keywords


Vehicular Ad-Hoc Network (VANET), Anonymity, Pseudonym Management System, Minimum Spanning Tree, Esau-Williams (EW) Algorithm, Entropy.

References