Cover
Vol. 20 No. 1 (2024)

Published: June 30, 2024

Pages: 25-36

Review Article

Privacy Issues in Vehicular Ad-hoc Networks: A Review

Abstract

Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.

References

  1. T. Greeshma and T. Roshini, “A review on privacy- preserving authentication in vanets,” in 2018 Interna- tional Conference on Control, Power, Communication and Computing Technologies (ICCPCCT), pp. 235–238, IEEE, 2018.
  2. F. Qu, Z. Wu, F.-Y. Wang, and W. Cho, “A security and privacy review of vanets,” IEEE Transactions on Intel- ligent Transportation Systems, vol. 16, no. 6, pp. 2985– 2996, 2015.
  3. R. Al-Ani, T. Baker, B. Zhou, and Q. Shi, “Privacy and safety improvement of vanet data via a safety-related privacy scheme,” International Journal of Information Security, pp. 1–21, 2023.
  4. H. V. Maddiboyina and V. S. Ponnapalli, “Fuzzy logic based vanets: A review on smart transportation system,” in 2019 International Conference on Computer Com- munication and Informatics (ICCCI), pp. 1–4, IEEE, 2019.
  5. R. Al-Ani, B. Zhou, Q. Shi, T. Baker, and M. Abdl- hamed, “Adjusted location privacy scheme for vanet safety applications,” in NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1– 4, IEEE, 2020.
  6. D. Manivannan, S. S. Moni, and S. Zeadally, “Secure authentication and privacy-preserving techniques in ve- hicular ad-hoc networks (vanets),” Vehicular Communi- cations, vol. 25, p. 100247, 2020. 35 | Farhood, Abed & Al-Shareeda
  7. M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, and S. Manickam, “Survey of authentication and privacy schemes in vehicular ad hoc networks,” IEEE Sensors Journal, vol. 21, no. 2, pp. 2422–2433, 2020.
  8. S. H. Lim, Y. K. Chia, and L. Wynter, “Accurate and cost- effective traffic information acquisition using adaptive sampling: Centralized and v2v schemes,” Transporta- tion Research Part C: Emerging Technologies, vol. 94, pp. 99–120, 2018.
  9. F. Arena, G. Pau, and A. Severino, “A review on ieee 802.11 p for intelligent transportation systems,” Journal of Sensor and Actuator Networks, vol. 9, no. 2, p. 22, 2020.
  10. S. Y. A. Al-Shareeda, Enhancing security, privacy, and efficiency of vehicular networks. PhD thesis, The Ohio State University, 2017.
  11. M. Babaghayou, N. Labraoui, A. A. A. Ari, N. Lagraa, and M. A. Ferrag, “Pseudonym change-based privacy- preserving schemes in vehicular ad-hoc networks: A survey,” Journal of Information Security and Applica- tions, vol. 55, p. 102618, 2020.
  12. I. A. Aljabry and G. A. Al-Suhail, “A qos evaluation of aodv topology-based routing protocol in vanets,” in 2022 International Conference on Engineering & MIS (ICEMIS), pp. 1–6, IEEE, 2022.
  13. S.-h. Sun, J.-l. Hu, Y. Peng, X.-m. Pan, L. Zhao, and J.-y. Fang, “Support for vehicle-to-everything services based on lte,” IEEE Wireless Communications, vol. 23, no. 3, pp. 4–8, 2016.
  14. S. S. Manvi and S. Tangade, “A survey on authentication schemes in vanets for secured communication,” Vehicu- lar Communications, vol. 9, pp. 19–30, 2017.
  15. P. Mundhe, S. Verma, and S. Venkatesan, “A compre- hensive survey on authentication and privacy-preserving schemes in vanets,” Computer Science Review, vol. 41, p. 100411, 2021.
  16. S. Al-Shareeda and F. ¨Ozg¨uner, “Preserving location privacy using an anonymous authentication dynamic mixing crowd,” in 2016 IEEE 19th International Con- ference on Intelligent Transportation Systems (ITSC), pp. 545–550, 2016.
  17. F. Schaub, Z. Ma, and F. Kargl, “Privacy requirements in vehicular communication systems,” in 2009 Interna- tional Conference on Computational Science and Engi- neering, vol. 3, pp. 139–145, IEEE, 2009.
  18. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “Caravan: Providing lo- cation privacy for vanet,” Proceedings of Embedded Security in Cars (ESCAR), vol. 8, 2005.
  19. A. Boualouache, S.-M. Senouci, and S. Moussaoui, “A survey on pseudonym changing strategies for vehicular ad-hoc networks,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 770–790, 2017.
  20. L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “En- hancing wireless location privacy using silent period,” in IEEE Wireless Communications and Networking Con- ference, 2005, vol. 2, pp. 1187–1192, IEEE, 2005.
  21. M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & swap: user-centric approaches towards maxi- mizing location privacy,” in Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 19–28, 2006.
  22. K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, “Amoeba: Robust location privacy scheme for vanet,” IEEE Journal on Selected Areas in communications, vol. 25, no. 8, pp. 1569–1589, 2007.
  23. T. Limbasiya and D. Das, “Secure message confirmation scheme based on batch verification in vehicular cloud computing,” Physical Communication, vol. 34, pp. 310– 320, 2019.
  24. M. Gerlach and F. Guttler, “Privacy in vanets us- ing changing pseudonyms-ideal and real,” in 2007 IEEE 65th Vehicular Technology Conference-VTC2007- Spring, pp. 2521–2525, IEEE, 2007.
  25. L. Butty´an, T. Holczer, and I. Vajda, “On the effective- ness of changing pseudonyms to provide location privacy in vanets,” in Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cam- bridge, UK, July 2-3, 2007. Proceedings 4, pp. 129–141, Springer, 2007.
  26. I. Goldberg and M. J. Atallah, Privacy enhancing tech- nologies. Springer, 2009.
  27. B. K. Chaurasia and S. Verma, “Optimizing pseudonym updation for anonymity in vanets,” in 2008 IEEE Asia- Pacific Services Computing Conference, pp. 1633–1637, IEEE, 2008.
  28. L. Butty´an, T. Holczer, A. Weimerskirch, and W. Whyte, “Slow: A practical pseudonym changing scheme for lo- cation privacy in vanets,” in 2009 IEEE vehicular net- working conference (VNC), pp. 1–8, IEEE, 2009. 36 | Farhood, Abed & Al-Shareeda
  29. J. Liao and J. Li, “Effectively changing pseudonyms for privacy protection in vanets,” in 2009 10th International Symposium on Pervasive Systems, Algorithms, and Net- works, pp. 648–652, IEEE, 2009.
  30. Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,” in 2010 Proceedings IEEE Infocom, pp. 1–9, IEEE, 2010.
  31. J.-H. Song, V. W. Wong, and V. C. Leung, “Wireless lo- cation privacy protection in vehicular ad-hoc networks,” Mobile Networks and Applications, vol. 15, pp. 160–171, 2010.
  32. A. Wasef and X. Shen, “Rep: Location privacy for vanets using random encryption periods,” Mobile Networks and Applications, vol. 15, pp. 172–185, 2010.
  33. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking,” IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1089–1107, 2010.
  34. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, “Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study,” in 19th USENIX Security Symposium (USENIX Security 10), 2010.
  35. D. Eckhoff, R. German, C. Sommer, F. Dressler, and T. Gansen, “Slotswap: Strong and affordable location privacy in intelligent transportation systems,” IEEE Com- munications Magazine, vol. 49, no. 11, pp. 126–133, 2011.
  36. Y. Pan, J. Li, L. Feng, and B. Xu, “An analytical model for random changing pseudonyms scheme in vanets,” in 2011 International Conference on Network Computing and Information Security, vol. 2, pp. 141–145, IEEE, 2011.
  37. Y. Pan and J. Li, “Cooperative pseudonym change scheme based on the number of neighbors in vanets,” Journal of Network and Computer Applications, vol. 36, no. 6, pp. 1599–1609, 2013.
  38. K. Emara, W. Woerndl, and J. Schlichter, “Caps: Context-aware privacy scheme for vanet safety appli- cations,” in Proceedings of the 8th ACM conference on security & privacy in wireless and mobile networks, pp. 1–12, 2015.
  39. M. Babaghayou, N. Labraoui, A. A. A. Ari, and A. M. Gueroui, “Transmission range changing effects on lo- cation privacy-preserving schemes in the internet of ve- hicles,” International Journal of Strategic Information Technology and Applications (IJSITA), vol. 10, no. 4, pp. 33–54, 2019.
  40. M. Babaghayou, N. Labraoui, A. A. Abba Ari, M. A. Ferrag, L. Maglaras, and H. Janicke, “Whisper: A loca- tion privacy-preserving scheme using transmission range changing for internet of vehicles,” Sensors, vol. 21, no. 7, p. 2443, 2021.
  41. M. Babaghayou, N. Chaib, N. Lagraa, M. A. Ferrag, and L. Maglaras, “A safety-aware location privacy- preserving iov scheme with road congestion-estimation in mobile edge computing,” Sensors, vol. 23, no. 1, p. 531, 2023.
  42. K. Emara, “Poster: Prext: Privacy extension for veins vanet simulator,” in 2016 IEEE Vehicular Networking Conference (VNC), pp. 1–2, IEEE, 2016.