You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

1 April 2021

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles

,
,
,
,
and
1
STIC Lab, University of Abou Bekr Belkaid, Chetouane Tlemcen 13000, Algeria
2
DAVID Lab, Faculty of Sciences, University of Versailles Saint-Quentin-en-Yvelines, 45 Avenue des États-Unis, CEDEX, 78035 Versailles, France
3
LaRI Lab, University of Maroua, Maroua P.O. Box 814, Cameroon
4
Department of Computer Science, Guelma University, Guelma 24000, Algeria
This article belongs to the Special Issue Cyber Security in IoT Era

Abstract

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various privacy-preserving schemes have been designed and evaluated, for example, mix-zone, encryption, group forming, and silent-period-based techniques. However, they all suffer inherent limitations. In this paper, we review these limitations and propose WHISPER, a safety-aware location privacy-preserving scheme that adjusts the transmission range of vehicles in order to prevent continuous location monitoring. We detail the set of protocols used by WHISPER, then we compare it against other privacy-preserving schemes. The results show that WHISPER outperformed the other schemes by providing better location privacy levels while still fulfilling road-safety requirements.

1. Introduction

A Vehicular Ad-hoc Network (VANET) with its variety of protocols (e.g., IEEE 802.11P, IEEE 1609) [1] and communication types like Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) [2] has served as a basis for the promising Internet of Vehicles (IoV) paradigm [3,4,5]. IoV benefits from VANET to extend the usability range by allowing non-conventional communications and applications, e.g., Vehicle to Everything (V2X) communications, to emerge. IoV is an important sub-domain of IoT as well as a clear example of System of Systems domain [6]. Figure 1 shows V2X external communications and internal equipments. A vehicle using V2X can enhance road-safety by broadcasting a Basic Safety Message (BSM) [7,8] beacon message with a 300-m range and a frequency of 1 to 10 BSMs per second from its OBU [9,10,11]. The data included in BSMs are illustrated in Figure 2. This allows receiving vehicles to be aware of the potential dangers posed by nearby vehicles in addition to managing road-congestion, which is considered a high-level challenge [5] through the network of Road-Side-Units (RSUs).
Figure 1. Vehicle to Everything (V2X) technology illustration.
Figure 2. Basic Safety Message (BSM) beacon format.
Since BSMs contain fine-grained location data, even though they are useful for road safety, they do open privacy-related issues: Any entity with eavesdropping capability can monitor the whereabouts of IoV users. Smart cars’ safety and infotainment applications may also reveal user private information. Using these data, a system that is ultimately designed to offer safety and comfort applications to drivers can be abused by third parties, such as employers, insurance companies, or criminal organizations to track individuals [12]. The introduction of mechanisms that can preserve location privacy has become a new research trend that has attracted widespread attention among researchers. Most existing location privacy schemes, e.g., mix-zone, synchronized schemes, etc., are ineffective in achieving a high-level of privacy because of the very precise locations included in BSMs and because of their resource and overhead-consuming characteristics. The better candidate mechanism used is that of the silent period schemes by ceasing BSMs broadcasting until emerging from another location with a new pseudo-identifier. However, the major drawback of such a technique is the sacrifice of safety for the sake of privacy [13].
As safety is a substantial requirement underpinning the introduction of V2X communication, silent period schemes have been received with reservations by the research community. Our motivation is to find a solution to allow nearby vehicles to be aware (providing safety) and reduce an adversary opportunity to employ eavesdropping attacks. The purpose of protecting user location privacy in an IoV context is related to the risk of user private information being disclosed. Location privacy is directly connected to other types of privacy. Location privacy leaks can reveal the home and work address of the driver, some visits to sensitive places, travel habits, times of absence from home, etc. The correlation of this spatio-temporal information with other data allows an adversary to come to conclusions about health habits, social contacts, religious beliefs, etc. Protecting user location privacy has many benefits both to the users and the system. First of all privacy preservation improves the performance of the IoV system and reduces users’ concerns about security and privacy. Thus IoVs can attract more users to use their functions and applications, especially those that are related to safety, promoting further innovation and development in the automobile industry. In this paper, we propose a mechanism that reduces the transmission range occasionally to just inform nearby vehicles and prevent the adversary from tracking users through BSMs. The design of a pseudonym change scheme that exploits such a transmission range adjustment feature is inspired by our previous work [9] where we studied the effect of changing the transmission range using existing strategies. The novel method that is proposed in the current article, entitled “WHISPER”, maintains road-safety since vehicles are only hidden from the tracker (occasionally) and not from close vehicles (always), which makes the use of WHISPER an advantageous feature that comes in favor of safety and privacy.
The main contributions of this paper are as follows:
-
We propose a novel location privacy-preserving scheme, entitled WHISPER, that maintains privacy without sacrificing safety;
-
We detail the techniques and protocols used by WHISPER for adjusting the transmission range and performing a pseudonym change;
-
We compare WHISPER to well-known location privacy-preserving schemes such as cooperative pseudonym change (CPN) [14], Random Silent Period (RSP) [15], and SLOW [16] in a manhattan-grid model with various densities using location privacy and QoS as metrics in addition to a comparative table.
The remainder of this paper is organized as follows: In Section 2, we review and discuss existing techniques to address the problem of location privacy in V2X. Then, we give our proposed system model in Section 3. Next, the proposed WHISPER scheme with its techniques and protocols are presented in Section 4. After that, WHISPER performances are analyzed in Section 5. Later in Section 6, we discuss the schemes in the obtained results perspective. Finally, Section 7 concludes the paper and gives future work.

3. System Model

In this section, we define and describe the Overall System Model comprised of a network model, the threat/attacker model, a set of assumptions that are taken while making such a research study in addition to technical details and a mathematical model that reflects the fundamentals of using certificates under an IoV system.

3.1. Network Model

The network model used in this paper is illustrated in Figure 3, and contains the following entities:
Figure 3. The different entities of the vehicular network.
  • Vehicles: They are the basic units of the VANET paradigm which provides a platform to the V2X applications. The communication is done via the 802.11p [3] standard and can perform Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. The set of vehicles is defined as V = { v 1 , v 2 , v n } .
  • System Authorities: They are the the entities related to the law-side (e.g., governmental bodies) that have different resources, tasks, and roles like: Distributing, issuing, revoking pseudonyms, etc. [41]. It is also important that the system authorities almost always are able to fulfill the accountability requirement in order to track down and determine misbehaving users [42].
  • Infrastructure: Composed by different components and stations, its role is to relay and facilitate the connectivity between the vehicles and any potential attached network entity. The most interesting feature is the Vehicle to Infrastructure (V2I) communications. Additionally, V2X communications may exploit the infrastructure.

3.2. Threat Model

The threat model is shown in Figure 4 and is composed from the following elements:
Figure 4. Threat model and its resources, capabilities, and coverage.
  • Tracker: The malicious element in the system, even though it is not active, can still execute many influencing attacks such as eavesdropping, tracking, profile-generation, etc. In most researches, the Global Passive Adversary (GPA) [10] is considered as the adversary type used while evaluating their own schemes. The GPA is a strong adversary that covers almost the whole map (or at least, the region of interest) and can obtain every sent message passively, i.e., no data forgery, modification, or creation is executed by him.
  • Eavesdropping stations: They are stations capable of collecting the transmitted BSMs where all of the coverage mode, the emplacement, and the transmission range of vehicles do affect the amount of the collected packets.
  • Tracker resources: They are the various materials and software used in conjunction with the eavesdropping stations. They can be high performance servers, tracking algorithms and methods, etc.

3.3. Assumptions

We put a set of assumptions for what is included in this research:
-
Vehicles are able to adjust their transmission range by changing the used transmission power.
-
The adversary is setting eavesdropping stations in accordance to the standardization (300 m of transmission range for vehicles).
-
The distributed eavesdropping stations do overlap in 30 m and have a moderate coverage mode to collect much BSMs by effectively exploiting the resources. This is illustrated in Figure 5.
Figure 5. The used coverage mode (moderate mode) details.
-
At a given time, the adversary can exclude the remaining of the map and only focuses on a region of interest. This is done at the aim of targeting only specific vehicles for better calculations and to well-exploit the resources (it is shown in Figure 5).
-
Vehicles use Public Key Infrastructure (PKI) certificates mechanism to communicate, thus, changing the used pseudonym implies using a new certificate. This later is assumed to be issued from a trusted authority by doing the certificates refill request.

3.4. Certificates Management

Since the use of pseudonyms implies the use of certificates, a better management is envisioned in order not to affect the functioning of the whole system. With this said, having a large set of certificates with less consumption frequency would be preferred, hence minimizing their refill requests. In order to quantify the used certificates for each vehicle per unit of time, an estimation is highly needed. For that aim, we provide the following equations related to the used certificates:
-
The estimated number of certificates per day N b r C e r t s d a y without changing the certificate by a number other than that of the expiration is calculated as in Equation (1):
N b r C e r t s _ d a y = N b r C e r t s _ m × D r i v T i m e _ d a y
where N b r C e r t s _ m is the number of used certificate per minute and D r i v T i m e _ d a y is the estimated amount of time (in minutes) that the user is going to drive per day.
-
The number of necessary certificates per year, assuming that a normal refill is made each year, is like in Equation (2):
N b r C e r t s _ y e a r = N b r C e r t s _ d a y × 365 .
-
From here, the estimated remaining certificates after d days since the last yearly refill ( N b r R e m a i n C e r t s ( d ) ) is calculated as written in Equation (3):
N b r R e m a i n C e r t s ( d ) = N b r C e r t s _ y e a r d × N b r C e r t s _ d a y .
-
However, certificates may also get invalid due to a certificate change (triggered by a pseudonym change for example) and thus, the exact remaining certificates after d days since the last yearly refill ( R e a l N b r R e m a i n C e r t s ( d ) ) can be calculated as in Equation (4):
R e a l N b r R e m a i n C e r t s ( d ) = N b r C e r t s _ y e a r d × N b r C e r t s _ d a y N b r C e r t s _ c h n g d
where N b r C e r t s _ c h n g d is the number of times the certificate got changed due to a reason other than a normal expiration.

4. The Proposed WHISPER Strategy

WHISPER uses the change of transmission power to preserve or at least augment the level of location privacy in addition to ensuring road-safety while driving. Vehicles monitor the neighborhood and their proper speeds on-the-fly in order to adjust their beacons transmission range. This is because the adversary, in our assumptions, distributes eavesdropping stations intelligently and economically according to the standardization (that vehicles transmit with 300 m of range). Thus, when driving in low speeds the vehicle (i.g., v i ) may reduce, according to the value of its speed (and the surrounding vehicles’ speeds), its own range to ensure that:
  • The safety of its neighbor vehicle(s) (e.g., v j ) is preserved unlike the case of the silent period schemes that do not make much safety-considerations when going to enter silent. This is fulfilled by continuously checking its own speed. Thus, when in high speeds, the risk of a sudden crash will be high, which is why v i ought to be visible earlier to the surrounding vehicles ( v j ).
  • Its own safety. This is fulfilled by the neighbor vehicle(s) v j that are using the same behavior as v i while driving in different speeds. They aim, as a consequence, to inform v i earlier when they are driving in high speeds. Once it has received a BSM with a powerful transmission range, v i takes that as a parameter and adjusts, in its role, its own transmission range based on that parameter and on its own speed. By doing so, v i will be visible to the other neighbors, v j as well.
  • The two aforementioned points lead to a collective awareness that will ensure the safety of both v i and its neighbor v j .
  • To benefit and exploit the already deployed eavesdropping mode, as these eavesdropping stations will not be able to collect BSMs all the time even if the vehicles are inside the area of the eavesdropping station. This is because each eavesdropping station is placed at the aim of intercepting every sent BSM in the range of 300 m.

4.1. System Initialization

Each vehicle v i is equipped with M certificates and each one of them is defined as ( C e r t i , j ) where j represents the i-th certificate of v i . Thus, each vehicle v i has a set of certificates C i defined as follows: C i = { C e r t i , 1 , C e r t i , 2 , C e r t i , m } . When referring to a pseudonym change, this implies the use of another certificate.
Before we dive into the detailed modus-operandi of WHISPER, we define the set of concepts (find them in Table 2) that are key-parameters used to determine the exact behavior of WHISPER.
Table 2. WHISPER keywords, concepts, and detailed definitions.
Generally speaking, in WHISPER, every vehicle v i can be in one of the following main states:
  • Vehicle ON: Is the state when a vehicle is turned on (to be ready for driving).
  • Listening: Once on, v i keeps monitoring the transmission medium to detect any transmitted BSM. Both its neighbor(s) status (found in their transmitted BSMs) and its own speed.
  • Receiving BSMs: When receiving a BSM from v j , v i proceeds into diverse calculations at the aim of knowing the status of v j .
  • Adjusting the transmission power: In this status, v i takes as parameters its own speed and the neighbors’ speed and may, accordingly, adjust its transmission range in order to ensure road-safety and preserve location-privacy of the present vehicles.
  • Checking pseudonym change condition: This status comes after the B e a c o n _ I n t e r v a l _ T i m e expires. v i will check its eligibility for a pseudonym (and certificate) change. When favorable, v i moves into the next status.
  • Pseudonym change: In this status, a pseudonym change takes place and the BSM will be sent right after.
  • Sending a BSM: This status happens after the Pseudonym change action. Sometimes, the pseudonym change trigger will not be satisfied, thus, v i just sends the BSM. In both scenarios, v i returns to the next status (Listening) afterwards.
  • Vehicle OFF: The status where a vehicle is turned off and thus the ending status.
A state diagram is presented in Figure 6 which gives a better illustration and understanding on the aforementioned states and the existing transitions.
Figure 6. The state diagram of WHISPER.

4.2. Receiving Beacon Messages Protocol

Vehicles are always ready to receive BSMs. When receiving a BSM, the receiving vehicle v i considers the sender’s position and calculates the distance between itself and the sender. By doing this simple calculation, v i will be able to get a set of useful information that will determine its behavior. The pseudo-code of receiving a beacon message in WHISPER is illustrated in Algorithm 1. The main conclusions that v i is going to have after parsing the BSM sent by v j are the following:
  • Knowing the distance between itself and v j .
  • Whether to consider v j ’s BSM for transmission power adjustment or just ignore it.
  • It considers v j ’s BSM for transmission power adjustment if D i s t is less than or equal to G e n e r a l N R (shown in the scenario that is illustrated in Figure 7).
    Figure 7. WHISPER behavior in the presence and influence of general neighbors on the transmission range adjustment.
  • It considers v j ’s BSM for transmission power adjustment if D i s t is less than or equal to R o a d N R but also share the same road segment with each other (shown in the scenario that is illustrated in Figure 8).
    Figure 8. WHISPER behavior in the presence and influence of road neighbors on the transmission range adjustment.
  • It considers itself eligible for the pseudonym change if D i s t is less than or equal to C l o s e N R . It does change C l o s e to T r u e as a consequence.
This protocol is called whenever v i receives a BSM generated by v j and with each call, less than 10 instructions are executed thus a linear complexity per each call O ( 10 ) . With this said, by receiving ( R ) BSM, the complexity of the whole protocol will be as in Equation (5):
O ( R × 10 ) = O ( n ) .
This indicates that the R e c e i v i n g B e a c o n M e s s a g e s protocol is neither time nor resources consumer.
Algorithm 1 Receiving Beacon
1:
procedureReceiving_Beacon(beacon* bsm)
2:
     H i s _ P o s B S M . S e n d e r P o s ( ) ;
3:
     D i s t C a l c _ D i s t ( M y _ P o s , H i s _ p o s ) ;
4:
    if ( ( D i s t < = G e n e r a l N R ) OR ( ( D i s t < = R o a d N R ) AND ( M y R o a d I D = H i s R o a d I D ) ) then
5:
         H i s _ S p e e d B S M . S e n d e r S p e e d ( ) ;
6:
         S p e e d M a x ( M y _ S p e e d , H i s _ S p e e d ) ;
7:
        if ( D i s t < = C l o s e N R ) then
8:
            C l o s e T R U E ;
9:
        end if
10:
    end if
11:
    Process_Beacon(BSM);
12:
end procedure

4.3. Transmission Range Adjustment Protocol

Each vehicle v i , and after the B e a c o n _ I n t e r v a l _ T i m e expires, will send a BSM to inform the nearby vehicles about its location. Particularly, WHISPER adjusts the transmission range prior to the final BSM broadcast. The adjustment is done each time a BSM is received by v i as explained before. When going to broadcast, v i uses the value of S p e e d to decide the appropriate transmission range (between all of the four levels: Low, Medium, beyond-Medium, and High). Algorithm 2 shows the pseudo-code of sending a BSM after making the transmission range adjustment step. Additionally, S p e e d is reinitialized to 0 after that and C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) is called during this protocol and that is to see the eligibility of changing v i ’s pseudonym (and certificate respectively). Moreover, C o u n t e r is decreased depending on the value of S p e e d and this is to trigger the pseudonym change (will be seen in the next point). However, if S p e e d is at max level, there will be no meaning for changing the pseudonym and that is because the attacker is able to collect every sent beacon (the maximum transmission range is used) and that is why C o u n t e r is reinitialized to its default value D e f _ V a l .
This protocol is called whenever v i B e a c o n _ I n t e r v a l _ T i m e expires and thus, one time per call. However, it calls, in its role, the C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) protocol. In total, there are 7 instructions without counting the called protocol ( O ( 7 ) ). With this said, the complexity of the T r a n s m i s s i o n R a n g e A d j u s t m e n t protocol is defined as in Equation (6):
O ( 1 × ( 7 + O ( C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) ) ) ) = O ( C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) ) .
This indicates that the T r a n s m i s s i o n R a n g e A d j u s t m e n t protocol does depend on the P s e u d o n y m C h a n g e T r i g g e r protocol.
Algorithm 2 Sending Beacon
1:
procedureSending_Beacon
2:
    while ( O B U _ I s _ O n ) do
3:
         W a i t ( B e a c o n _ I n t e r v a l _ T i m e ) ;
4:
        Prepare_Beacon(BSM);
5:
         S p e e d M a x ( M y _ S p e e d , S p e e d ) ;
6:
        if ( S p e e d < 18 ) then
7:
            n i c . m a c 80211 p . t x P o w e r 0.2 ;
8:
            C o u n t e r C o u n t e r 5 ;
9:
        else if ( S p e e d < 36 ) then
10:
            n i c . m a c 80211 p . t x P o w e r 0.8 ;
11:
            C o u n t e r C o u n t e r 10 ;
12:
        else if ( S p e e d < 54 ) then
13:
            n i c . m a c 80211 p . t x P o w e r 3.1 ;
14:
        else
15:
            n i c . m a c 80211 p . t x P o w e r 7 ;
16:
            C o u n t e r D e f _ V a l ;
17:
        end if
18:
         S p e e d 0 ;
19:
        Checking_Pseudonym_Change_Trigger();
20:
        Send_Beacon(BSM);
21:
    end while
22:
end procedure

4.4. Pseudonym Change Trigger Protocol

In order to avoid wasting pseudonyms (certificates) in an inappropriate opportunity, finding an almost good opportunity requires that the pseudonym change trigger must be implemented delicately. Algorithm 3 shows, in a pseudo-code, the way vehicles perform a check to see the eligibility for changing their pseudonyms. When the trigger Counter reaches or drops below (0) (which is an indicator that v i was sending BSMs with a short range for some important period of time) v i changes its pseudonym then initializes the trigger Counter. This whole process provides high confusion chances since the pseudonym change is performed not in the favor of the tracker (see the scenario illustrated in Figure 9). The P s e u d o n y m C h a n g e T r i g g e r protocol is used each time the T r a n s m i s s i o n R a n g e A d j u s t m e n t is executed. Its complexity depends on a small and fixed number of instructions (5), thus, can be defined as in Equation (7):
O ( 5 ) = O ( 1 ) .
Figure 9. WHISPER, pseudonym change process triggered by a close neighbor’s status.
The P s e u d o n y m C h a n g e T r i g g e r protocol has O ( 1 ) as a complexity.
Algorithm 3 Checking Pseudonym Change Trigger
1:
procedureChecking_Pseudonym_Change_Trigger
2:
    if ( ( C o u n t e r < = ( D e f _ V a l / 2 ) ) AND ( C l o s e ) ) then
3:
         C o u n t e r D e f _ V a l ;
4:
        Pseudonym_Change();
5:
    else if ( C o u n t e r < = 0 ) then
6:
         C o u n t e r D e f _ V a l ;
7:
        Pseudonym_Change();
8:
    end if
9:
     C l o s e F A L S E ;
10:
end procedure

5. Performance Evaluation

To validate the performances of WHISPER, we use simulation runs in a manhattan grid model created using the NETEDIT script included in SUMO; the mobility simulator [43]. SUMO is considered as one of the most credible and realistic mobility simulators. The mobility and environment information used for the simulation are presented in Table 3. The manhattan grid model consists of 9 intersected roads with attached segments where each segment has a length of 200 m.
Table 3. Simulation parameters and values.
Concerning the network simulator, we use OMNeT++ [44]; the component is c++ based and discrete events simulator. OMNet++ allows the integration of diverse frameworks depending on the simulation nature like Veins [45], which is the vehicular network simulator. Veins acts as a bridge between the mobility simulator SUMO and the network simulator OMNet++. We also employ the PREXT extension [27] that is developed by Emmara et al.; a Veins extension that integrates a set of (1) location privacy schemes, (2) some privacy metrics such as the traceability and the normalized traceability (described in [46]), and (3) a Quality of Service (QoS) metric (the consumption of pseudonyms/certificates). A block diagram is elaborated in order to facilitate the comprehension of the interaction between the different simulation tools (shown in Figure 10). Based on PREXT, WHISPER is evaluated and compared against some other schemes under the same environmental condition using the aforementioned metrics. The schemes’ parameters and the evaluation metrics are also presented in Table 3.
Figure 10. The block diagram of the different used simulation tools.

5.1. The Adversary’s Achieved Traceability

Traceability, the location privacy metric used in this study, is defined as the correctness of an adversary to build the target vehicle’s traces using its eavesdropped beacons [46]. The results, provided in Figure 11 show that WHISPER outperformed SLOW, RSP, and CPN in the traceability metric with a clear difference (ranging in the interval of 10 % to 20 % ). An important remark is that at dense situations (e.g., with the density of 200 vehicle), the traceability gets augmented a bit. The reason behind the decrease in the privacy level is due to the higher density of vehicles, which can help the attacked collect BSMs from the legitimate cars.
Figure 11. The achieved traceability by SLOW, Random Silent Period (RSP), Cooperative Pseudonym Change (CPN), and WHISPER within different densities.
In general, as presented in Figure 11, WHISPER performs better in terms of the level of privacy that it offered since it achieves a traceability ranging in the interval of 10 % to 20 % . We interpret this as being WHISPER reducing the vehicle’s transmission range according to its and/or the neighbor vehicles’ speeds (according to the safety situation) followed by CPN, RSP, then SLOW, in addition we observe that the traceability decreases when augmenting the number of vehicles in SLOW. The reason is that, in high densities, vehicles would drive with lower speeds, thus, SLOW performs better.

5.2. The Adversary’s Achieved Normalized Traceability

As some vehicles may not perform the pseudonym change, building their traces becomes easy, thus, excluding them gives more fairness to the real level of privacy [46]; that is the normalized traceability. With this definition, our conducted simulation under the normalized traceability aims to give a more credible and better privacy-reflecting metric to quantify the achieved privacy level of WHISPER, SLOW, RSP, and CPN (shown in Figure 12).
Figure 12. The achieved normalized traceability by SLOW, RSP, CPN, and WHISPER within different densities.
As stated above, by taking the case of just the vehicles which did change their pseudonyms, we get the achieved normalized traceability as shown in Figure 12. The results always give WHISPER the leading position since it outperforms the other schemes but this time by achieving an even higher privacy level represented in a lower than 10 % of normalized traceability. The same order of performance remains: CPN, RSP, then SLOW. However, SLOW has achieved better-normalized traceability of about 30 % due to removing vehicles that did not change their pseudonyms at all from the calculation.

5.3. Pseudonym Consumption

Also considered is the QoS metric. The pseudonym consumption has multiple effects and impacts like the use of different pseudonyms (thus, certificates), extra-communications with the corresponding authorities to refill pseudonyms, affecting the routing algorithms [30], etc. For this reason, the pseudonym consumption metric is crucial. With a clear view, Figure 13 shows that SLOW is the less-pseudonym consuming scheme followed by RSP and WHISPER respectively, while CPN had a considerable high pseudonyms consumption level. We argue this by the scheme’s nature, when the trigger of k neighbors is satisfied, a pseudonym change is performed and as k was taken as 2 by the default parameters, a lot of pseudonym changes occurred.
Figure 13. The pseudonyms changes (consumption) evaluation of CPN, WHISPER, RSP, and SLOW within different densities.

6. Discussion

For an overall investigation, the performances of CPN, RSP, SLOW, and WHISPER were evaluated in terms of (1) location privacy that gives WHISPER the leading in both (a) traceability and (b) normalized traceability and (2) QoS comes in the favor of SLOW. CPN, under the default parameters (i.e., k = 2 ), has resulted in a very high pseudonym consumption, thus, considered as a non-wise choice for a deployed pseudonym scheme. The results, clearly show that WHISPER has a very good level of privacy since it achieves traceability ranging in the interval of 10% to 20%. In terms of normalized traceability, WHISPER outperformed the other schemes achieving an even higher privacy level.
Despite WHISPER consuming more pseudonyms (with a remarkably low amount in general) than SLOW and RSP, having it a very high location privacy level represented in the traceability and the normalized traceability gives it the leading position. Thus, we can say that WHISPER, as also compared and summarized in Table 4, has outperformed the other schemes especially in both the safety and location privacy that are known to be on the top of the security requirements.
Table 4. A brief comparison of SLOW, RSP, CPN, and WHISPER strategies according to a set of metrics.
Except for the evaluation comparison, WHISPER is an important solution that offers privacy preservation while maintaining at the same time road-safety. This is achieved since vehicles are only hidden from the tracker (occasionally) and not from the close vehicles (always), which makes the use of WHISPER an advantageous method that comes in favor of safety and privacy.

7. Conclusions and Future Work

In this paper, WHISPER, a novel location privacy-preserving scheme that is based on reducing the transmission range while sending the safety beacons was proposed. We presented WHISPER protocols, techniques, and algorithms and compared them against other methods, namely CPN, RSP, and SLOW in terms of the location privacy level (traceability, normalized traceability) and QoS (pseudonyms consumption) metrics. WHISPER clearly outperformed the other schemes in location privacy evaluation, which is an important security requirement, but consumed, lightly, more pseudonyms than SLOW and RSP as the QoS evaluation demonstrated. Furthermore, WHISPER showed its robustness during the evaluation and also provided (1) road safety that is missed by all other silent period schemes in conjunction with (2) location privacy.
The reason why WHISPER is a road-safety mechanism is that the vehicle is only hidden from the tracker (occasionally) and not from close vehicles (always) which made the use of WHISPER (or at least, the change of transmission range protocol) an advantageous feature that works in favor of safety and privacy alike.
As this new technique has not been exploited before in the privacy field, we intend on evaluating the achieved location privacy level versus an internal attacker i.e., when vehicles act as malicious eavesdropping stations in order to bypass the reduction of transmission range and increase the coverage of the attacker. Also, some of the values (e.g., existing in Algorithm 2) are set heuristically, evaluating the performance by optimally adjusting those values dynamically would certainly enhance the obtained privacy level of WHISPER. Moreover technologies like blockchain [47], cryptography [48], IDSs [49], and Edge Computing [50] which are widely recognized as key enablers for IoV could be integrated or used in parallel with our solution. Finally, using other metrics like the number of sent BSMs, the number of verified signatures, and evaluating WHISPER’s performance under different scenarios like the free-way model are some of our future plans.

Author Contributions

Conceptualization, M.B., N.L. and L.M.; Methodology, M.B., A.A.A.A. and L.M.; Software, M.B., H.J., M.A.F. and N.L.; Validation, M.A.F., N.L. and L.M.; formal analysis, A.A.A.A., M.A.F. and N.L.; investigation, M.B., N.L., A.A.A.A. and M.A.F.; resources, M.A.F., N.L. and M.B.; data curation, M.B., H.J., N.L. and L.M.; writing—original draft preparation, M.B., N.L. and M.A.F.; writing—review and editing, A.A.A.A., H.J. and L.M.; visualization, M.A.F., M.B., N.L. and L.M.; supervision, N.L., A.A.A.A. and M.A.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy reasons.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  2. Al-Sultan, S.; Al-Doori, M.M.; Al-Bayatti, A.H.; Zedan, H. A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
  3. Wang, J.; Shao, Y.; Ge, Y.; Yu, R. A survey of vehicle to everything (v2x) testing. Sensors 2019, 19, 334. [Google Scholar] [CrossRef]
  4. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of internet of vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
  5. Lin, K.; Li, C.; Li, Y.; Savaglio, C.; Fortino, G. Distributed learning for vehicle routing decision in software defined Internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020. [Google Scholar] [CrossRef]
  6. Fortino, G.; Savaglio, C.; Spezzano, G.; Zhou, M. Internet of Things as System of Systems: A Review of Methodologies, Frameworks, Platforms, and Tools. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 223–236. [Google Scholar] [CrossRef]
  7. Zhang, M.; Ali, G.M.N.; Chong, P.H.J.; Seet, B.C.; Kumar, A. A novel hybrid mac protocol for basic safety message broadcasting in vehicular networks. IEEE Trans. Intell. Transp. Syst. 2019, 21, 4269–4282. [Google Scholar] [CrossRef]
  8. Lu, R.; Lin, X.; Zhu, H.; Ho, P.H.; Shen, X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1229–1237. [Google Scholar]
  9. Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Gueroui, A.M. Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. Int. J. Strateg. Inf. Technol. Appl. 2019, 10, 33–54. [Google Scholar] [CrossRef]
  10. Ferrag, M.A.; Maglaras, L.; Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Commun. Surv. Tutor. 2017, 19, 3015–3045. [Google Scholar] [CrossRef]
  11. Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Lagraa, N.; Ferrag, M.A. Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 2020, 55, 102618. [Google Scholar] [CrossRef]
  12. Maglaras, L.A.; Al-Bayatti, A.H.; He, Y.; Wagner, I.; Janicke, H. Social internet of vehicles for smart cities. J. Sens. Actuator Netw. 2016, 5, 3. [Google Scholar] [CrossRef]
  13. Eckhoff, D.; Sommer, C. Readjusting the privacy goals in Vehicular Ad-Hoc Networks: A safety-preserving solution using non-overlapping time-slotted pseudonym pools. Comput. Commun. 2018, 122, 118–128. [Google Scholar] [CrossRef]
  14. Pan, Y.; Li, J. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 2013, 36, 1599–1609. [Google Scholar] [CrossRef]
  15. Huang, L.; Matsuura, K.; Yamane, H.; Sezaki, K. Enhancing wireless location privacy using silent period. In Proceedings of the 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; pp. 1187–1192. [Google Scholar]
  16. Buttyán, L.; Holczer, T.; Weimerskirch, A.; Whyte, W. Slow: A practical pseudonym changing scheme for location privacy in vanets. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; pp. 1–8. [Google Scholar]
  17. Huang, R.; Ying, B.; Nayak, A. Protecting location privacy in opportunistic mobile social networks. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–8. [Google Scholar]
  18. Babaghayou, M.; Labraoui, N.; Ari, A.A.A. Location-Privacy Evaluation within the Extreme Points Privacy (EPP) Scheme for VANET Users. Int. J. Strateg. Inf. Technol. Appl. 2019, 10, 44–58. [Google Scholar] [CrossRef]
  19. Beresford, A.R.; Stajano, F. Location privacy in pervasive computing. IEEE Pervasive Comput. 2003, 2, 46–55. [Google Scholar] [CrossRef]
  20. Freudiger, J.; Raya, M.; Félegyházi, M.; Papadimitratos, P.; Hubaux, J.P. Mix-zones for location privacy in vehicular networks. In Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, BC, Canada, 14–17 August 2007. [Google Scholar]
  21. Petit, J.; Schaub, F.; Feiri, M.; Kargl, F. Pseudonym schemes in vehicular networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 228–255. [Google Scholar] [CrossRef]
  22. European Telecommunications Standards Institute (ETSI), TR. Intelligent Transport Systems (ITS); Security; Pre-Standardization Study on Pseudonym Change Management. 2018. Available online: https://www.etsi.org/deliver/etsi_tr/103400_103499/103415/01.01.01_60/tr_103415v010101p.pdf (accessed on 20 March 2021).
  23. European Telecommunications Standards Institute (ETSI), TS. Intelligent Transport Systems (ITS); Security; Security Management Messages Communication Requirements and Distribution Protocols. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/103600_103699/103601/01.01.01_60/ts_103601v010101p.pdf (accessed on 20 March 2021).
  24. Eckhoff, D.; German, R.; Sommer, C.; Dressler, F.; Gansen, T. Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Commun. Mag. 2011, 49, 126–133. [Google Scholar] [CrossRef]
  25. Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2012, 61, 86–96. [Google Scholar] [CrossRef]
  26. Tomandl, A.; Scheuer, F.; Federrath, H. Simulation-based evaluation of techniques for privacy protection in VANETs. In Proceedings of the 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 8–10 October 2012; pp. 165–172. [Google Scholar]
  27. Emara, K. Poster: PREXT: Privacy extension for veins VANET simulator. In Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 1–2. [Google Scholar]
  28. Emara, K.; Woerndl, W.; Schlichter, J. CAPS: Context-aware privacy scheme for VANET safety applications. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 24–26 June 2015; p. 21. [Google Scholar]
  29. Zidani, F.; Semchedine, F.; Ayaida, M. Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. Comput. Electr. Eng. 2018, 71, 359–371. [Google Scholar] [CrossRef]
  30. Schoch, E.; Kargl, F.; Leinmüller, T.; Schlott, S.; Papadimitratos, P. Impact of pseudonym changes on geographic routing in vanets. In Proceedings of the European Workshop on Security in Ad-hoc and Sensor Networks, Hamburg, Germany, 20–21 September 2006; pp. 43–57. [Google Scholar]
  31. Goudarzi, F.; Asgari, H. Non-Cooperative Beacon Power Control for VANETs. IEEE Trans. Intell. Transp. Syst. 2019, 20, 777–782. [Google Scholar] [CrossRef]
  32. Mussa, S.A.B.; Manaf, M.; Ghafoor, K.Z. Beaconing and transmission range adaptation approaches in vehicular ad hoc networks: Trends & research challenges. In Proceedings of the 2014 International Conference on Computational Science and Technology (ICCST), Kota Kinabalu, Malaysia, 27–28 August 2014; pp. 1–6. [Google Scholar]
  33. Song, L.; Sun, G.; Yu, H.; Du, X.; Guizani, M. Fbia: A fog-based identity authentication scheme for privacy preservation in internet of vehicles. IEEE Trans. Veh. Technol. 2020, 69, 5403–5415. [Google Scholar] [CrossRef]
  34. Ferrag, M.A.; Ahmim, A. ESSPR: An efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network. Telecommun. Syst. 2017, 66, 481–503. [Google Scholar] [CrossRef]
  35. Aman, M.N.; Javaid, U.; Sikdar, B. A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
  36. Sutrala, A.K.; Bagga, P.; Das, A.K.; Kumar, N.; Rodrigues, J.J.; Lorenz, P. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Trans. Veh. Technol. 2020, 69, 5535–5548. [Google Scholar] [CrossRef]
  37. Dwivedi, S.K.; Amin, R.; Vollala, S.; Chaudhry, R. Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities. Comput. Electr. Eng. 2020, 86, 106719. [Google Scholar] [CrossRef]
  38. Zhang, W.; Li, G. An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment. IEEE Access 2020, 8, 64461–64474. [Google Scholar] [CrossRef]
  39. Vasudev, H.; Deshpande, V.; Das, D.; Das, S.K. A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles. IEEE Trans. Veh. Technol. 2020, 69, 6709–6717. [Google Scholar] [CrossRef]
  40. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.; Choo, K.K.R.; Park, Y. On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 2021, 70, 1736–1751. [Google Scholar] [CrossRef]
  41. Nowatkowski, M.E.; Wolfgang, J.E.; McManus, C.; Owen, H.L. The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS. In Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), Concord, NC, USA, 18–21 March 2010; pp. 380–383. [Google Scholar]
  42. Bouchelaghem, S.; Omar, M. Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput. Electr. Eng. 2020, 82, 106557. [Google Scholar] [CrossRef]
  43. Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
  44. Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Marseille, France, 3–7 March 2008; p. 60. [Google Scholar]
  45. Sommer, C.; German, R.; Dressler, F. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef]
  46. Emara, K.; Woerndl, W.; Schlichter, J. Context-based pseudonym changing scheme for vehicular adhoc networks. arXiv 2016, arXiv:1607.07656. [Google Scholar]
  47. Merzougui, S.E.; Ferrag, M.A.; Friha, O.; Maglaras, L. EASBF: An Efficient Authentication Scheme over Blockchain for Fog Computing-enabled Internet of Vehicles. J. Inf. Secur. Appl. 2021, 59, 102802. [Google Scholar]
  48. Tselikis, C.; Douligeris, C.; Maglaras, L.; Mitropoulos, S. On the conference key distribution system with user anonymity. J. Inf. Secur. Appl. 2020, 54, 102556. [Google Scholar] [CrossRef]
  49. Kosmanos, D.; Argyriou, A.; Maglaras, L. Estimating the relative speed of RF jammers in VANETs. Secur. Commun. Networks 2019. [Google Scholar] [CrossRef]
  50. Xu, X.; Xue, Y.; Qi, L.; Yuan, Y.; Zhang, X.; Umer, T.; Wan, S. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comput. Syst. 2019, 96, 89–100. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.