solipocket.blogg.se

Another layer of indirection
Another layer of indirection




another layer of indirection

Third, the scheme should be able to preserve as many as possible aspects of users’ privacy under various attacks. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. First, a user should never expose its precise location to any other entity. We argue that a good location privacy preservation scheme should have these properties. The main advantages of our protocol compared with the existing approaches include: 1) it makes larger anonymity set and higher entropy 2) it reduces the tracking probability 3) it can be used in both safety and non-safety communications and 4) Vehicles need not suspend regular communication for changing pseudonyms.Īs location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. Simulation results show that our protocol is feasible and produces excellent performances.

ANOTHER LAYER OF INDIRECTION SERIES

Finally, we do a series of simulations to evaluate the performance of our protocol in real VANET environments such as Manhattan and Urban.

another layer of indirection

Secondly, we analytically evaluate the anonymity and unlinkability of the proposed protocol. By considering unique characteristics of VANETs, we firstly propose a synchronized pseudonym changing protocol based on the concept of forming groups among neighboring vehicles. In this paper, we address the problem of movement tracking and enhance location privacy without affecting security and safety of vehicles.

another layer of indirection

Communication messages in Vehicular Ad-hoc Networks (VANETs) can be used to track movement of vehicles.






Another layer of indirection