Al-Ani, R, Shamsa, TB, Zhou, B and Shi, Q (2023) Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme. International Journal of Information Security. ISSN 1615-5262
|
Text
Privacy and Safety Improvement of VANET Data via SRPS.pdf - Accepted Version Download (873kB) | Preview |
Abstract
Vehicular Ad-hoc NETwork (VANET) safety applications allow vehicles to exchange messages with surrounding vehicles periodically to improve the contextual awareness of the drivers about the driving environment which significantly enhances traffic safety. However, these messages usually contain sensitive information such as the Spatio-temporal information of each vehicle which might be exploited by malicious entities for various purposes (e.g., monitoring the vehicle for a long period and breaching the driver’s privacy). Researchers have proposed different schemes to enhance the privacy level of drivers and their vehicles alike. However, most of the existing schemes have a negative impact on safety applications; they stop broadcasting messages for a period which increases the chance of accidents. In this paper, we propose a Safety-related Privacy Scheme (SRPS) that enhances both the privacy and safety of VANET safety applications by reducing silent periods without degrading the privacy level. Whilst the vehicle continues monitoring neighbour vehicles, if an accident is expected, it exits the silent period and starts sharing its location with its neighbour vehicles. The SRPS consists of two algorithms based on the status of the vehicle (i.e., silent vs. active). These algorithms use a multi-target tracking algorithm to search for an effective context to change pseudonyms and avoid potential accidents. Four simulators are used to implement SRPS. The latter has been compared with five pseudonym-changing schemes (PPC, RSP, CSP, SLOW, and CAPS). The simulation results indicate that SRPS achieves an efficient balance between security, privacy, and safety when compared to the other schemes.
Item Type: | Article |
---|---|
Additional Information: | This version of the article has been accepted for publication, after peer review (when applicable) and is subject to Springer Nature’s AM terms of use, but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: https://doi.org/10.1007/s10207-023-00662-6 |
Uncontrolled Keywords: | 08 Information and Computing Sciences; 15 Commerce, Management, Tourism and Services; Strategic, Defence & Security Studies |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | Springer |
SWORD Depositor: | A Symplectic |
Date Deposited: | 18 Jan 2023 10:32 |
Last Modified: | 06 Feb 2024 00:50 |
DOI or ID number: | 10.1007/s10207-023-00662-6 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/18661 |
View Item |