On evaluation of location privacy preserving schemes for VANET safety applications

Karim Emara, Wolfgang Woerndl, Johann Schlichter

Research output: Contribution to journalArticlepeer-review

49 Scopus citations

Abstract

Location privacy in vehicular ad hoc networks has gained considerable attention in the past few years. The majority of studies concern changing pseudonyms to prevent linking messages of the same pseudonym. However, the precise spatiotemporal information included in beacons (i.e., timestamp, position, speed and heading) makes them vulnerable to tracking even if they are completely anonymous. One of the most important issues in designing location privacy scheme is to preserve the quality of service of the application. This issue is more significant for safety applications, since they require precise and frequent state updates. Thus, it is crucial to consider this trade-off between location privacy and quality of service of the safety application when designing and evaluating privacy schemes. In this paper, we propose a methodology to measure both the protection level of a privacy scheme and its impact on safety applications. We employ an empirical vehicle tracker to measure the effectiveness of a privacy scheme in terms of the amount of confusions. We also measure its impact on a safety application by estimating the probability of correctly identifying the fundamental factors of that application using Monte Carlo analysis. Further, we propose an obfuscation privacy scheme which perturbs position and beacon frequency. Finally, we apply our methodology to evaluate the proposed scheme and compare it with the popular privacy scheme, random silent period.

Original languageEnglish
Pages (from-to)11-23
Number of pages13
JournalComputer Communications
Volume63
Issue number1
DOIs
StatePublished - 2015

Keywords

  • Forward collision warning
  • Impact on safety application
  • Location privacy
  • Spatiotemporal perturbation
  • Vehicle tracking

Fingerprint

Dive into the research topics of 'On evaluation of location privacy preserving schemes for VANET safety applications'. Together they form a unique fingerprint.

Cite this