Next Article in Journal
Sustainable Irrigation System for Farming Supported by Machine Learning and Real-Time Sensor Data
Previous Article in Journal
Design of an Optical Transparent Absorber and Defect Diagnostics Analysis Based on Near-Field Measurement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs

1
Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan
2
Department of Computer Science, Aberystwyth University, Aberystwyth SY23 3DB, UK
3
Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry CV4 7AL, UK
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(9), 3077; https://doi.org/10.3390/s21093077
Submission received: 21 February 2021 / Revised: 1 April 2021 / Accepted: 2 April 2021 / Published: 28 April 2021
(This article belongs to the Section Physical Sensors)

Abstract

:
Location privacy is a critical problem in the vehicular communication networks. Vehicles broadcast their road status information to other entities in the network through beacon messages. The beacon message content consists of the vehicle ID, speed, direction, position, and other information. An adversary could use vehicle identity and positioning information to determine vehicle driver behavior and identity at different visited location spots. A pseudonym can be used instead of the vehicle ID to help in the vehicle location privacy. These pseudonyms should be changed in appropriate way to produce uncertainty for any adversary attempting to identify a vehicle at different locations. In the existing research literature, pseudonyms are changed during silent mode between neighbors. However, the use of a short silent period and the visibility of pseudonyms of direct neighbors provides a mechanism for an adversary to determine the identity of a target vehicle at specific locations. Moreover, privacy is provided to the driver, only within the RSU range; outside it, there is no privacy protection. In this research, we address the problem of location privacy in a highway scenario, where vehicles are traveling at high speeds with diverse traffic density. We propose a Dynamic Grouping and Virtual Pseudonym-Changing (DGVP) scheme for vehicle location privacy. Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. We formally present the model and specify the scheme through High-Level Petri Nets (HLPN). The simulation results indicate that the proposed method improves the anonymity set size and entropy, provides lower traceability, reduces impact on vehicular network applications, and has lower computation cost compared to existing research work.

1. Introduction

The recent development of Intelligent Transportation Systems (ITS) play a pivotal role in making the lives of citizens more safe and comfortable on the road. One of the main goals of ITS is to create efficient traffic flows [1,2]. ITS integrate information and communication technology for collecting and disseminating road traffic-related information and data. They  can improve road safety, reduce collision, minimize environmental pollution, and provide convenience and entertainment services to the vehicle user. It is seen as strategic priority for industry to implement these technologies in connected vehicles on the road network. The use of communicating vehicles will increase road safety and improve road traffic efficiency. For this purpose, the concept of Vehicular Ad-hoc Networks (VANETs) has been introduced, providing a communication channel between road entities such as vehicles and Road-Side Units (RSUs). VANETs allow the development of advanced traffic management services in the road network where driver behavior, traffic flow, and road status can be shared between vehicles and infrastructure in the locality [3,4].
The basic technological elements that compose vehicular networks are sensors, radar, cameras, On-Board Units (OBU), Event Data Recorders (EDR), Global Positioning System (GPS), and omnidirectional antennas [5]. An OBU facilitates communication between one vehicle and other vehicles and road infrastructure. An EDR records all the communication events that occurred during a vehicle trip. Precise location coordinates are accessed and updated with the help of GPS. Radar and sensors indicate various types of obstacles and dangerous situations on the road. A tamper-proof device can be installed in the OBU to protect confidential vehicle information from an outsider attacker. The communication models of VANETs are divided into two categories namely, Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) [6,7]. While V2V provides communication between mobile entities, i.e., vehicles moving on the road, V2I supports communication between vehicles and infrastructure, exchanging various types of road environment information. Infrastructure is used as a gateway to the network authority. The communication technologies utilized include Dedicated Short-Range Communication (DSRC), WiMax, Cellular Network, WiFi and the VeMac protocol [8]. DSRC is one of the most widespread technologies used in automotive vehicles and is used as a standard of wireless communication technology in many cars in the market [9]. It is based on the IEEE 802.11p amendment of the IEEE 802.11 standard and operates in the dedicated frequency spectrum of 5.9 GHz.
VANETs applications can be divided into two categories, i.e., safety-related applications and comfort applications [1]. The main aim of safety-related applications is the safety of drivers and passengers through the dissemination upcoming hazardous events on the road networks. These applications provide protection by updating the current state of the surrounding environment of the road [10]. It includes road accident information, collision avoidance, lane changing warning, emergency, and so forth. Comfort or non-safety applications provide convenience and comfort to travelers on the road. This includes weather information, location services, nearest restaurant, games, advertisements, and so on. The Basic Safety Message (BSM) or Cooperative Aware Message (CAM), are beacon messages that are broadcast through the road environment to inform other nodes in the network about the road status information. The message contains the vehicle identity, speed, direction, location, and other information. This information is disseminated in the network in an open form, and everyone can access it, even if they are adversary or attacker. If an adversary catches the actual identity of a vehicle during a trip, they may come to know various locations visited by the vehicle driver. In this way, the adversary comes to know the behavior of the vehicle driver, producing various types of threats that may be physical harassment, damage to social reputation, property loss, and blackmail [11].
To protect location privacy in the case of VANETs, a pseudonym may be used in the beacon message instead of the actual identity of a vehicle. A pseudonym is a temporary identifier often used for a short period of time. However, the use of fixed pseudonyms don’t solve the privacy problem of a vehicle driver. Pseudonyms should be changed periodically to confuse an adversary about the actual vehicle communicating during a road network journey. To solve the problem of location privacy in existing literature, various pseudonym-changing schemes have been proposed that are based on the concept of a mix zone concept [12,13,14,15] and a silent period [16,17,18]. In the mix zone method, vehicles’ identities are mixed in specific areas that may be a fixed zone at a road intersection or some congested area of vehicles. These schemes can achieve a high level of location privacy in high vehicle traffic and at selected places. Still, they have certain limitations that make it difficult to provide privacy in lower-traffic conditions. The vehicles remain silent by not broadcasting beacons messages in silent period-based schemes. This hides the identities of a vehicle for a certain amount of time. These techniques have specific limitations; for example, the achievement of privacy at the cost of compromising road safety application of the vehicular network. There are some situations in which it is difficult for a vehicle to become silent in a cooperative manner; ultimately, the vehicle should remain silent in an independent manner, which reduces privacy protection. The schemes mentioned above are challenging to apply in the case of higher speed travel and low traffic density. There remains a need for a scheme that provides location privacy on a highway or main roads where vehicles are moving at high speed. To solve the problems mentioned in the existing literature, we propose a new scheme of distributed and dynamic virtual grouping that protects location privacy on main roads of the vehicular network.
The context-aware scheme CLPS, ref. [18] requires a vehicle to be synchronized with silent neighbors to change pseudonyms during a silent period for identity protection. However, the using isolated roads and short silent periods can assist an adversary in detecting the target vehicle. Moreover, once a subject vehicle has knowledge of neighbor’s pseudonyms, which provides a way for a linkability of pseudonyms. In [10], privacy is also preserved only while the vehicle is in the communication range of RSU.
In this paper, we propose a Dynamic Grouping and Virtual Pseudonym (DGVP) exchange scheme that provides location privacy to the vehicle in the road network. Our contributions in this paper are given below.
  • We introduce the concept of distributed and dynamic grouping based on road context information. Vehicles with similar status are combined in a group whose size depends on the number of transmission range neighbors; the pseudonyms are changed cooperatively.
  • The proposed scheme improves location privacy in low vehicle traffic density environments. For this purpose, a virtual pseudonym update scheme is used, in which vehicles generate some randomized version of a pseudonym to create uncertainty for an adversary in recognizing a target vehicle in a region of interest.
  • We also considered the privacy protection mechanism for vehicle communication with LBS in which a vehicle requests the nearest location. In this case, we introduce a position-mixing method that mixes the positions of vehicles in the vicinity to protect vehicle identities.
  • The proposed scheme DGVP uses road network information and does not change any road status information in beacon messages, which would reduce the privacy scheme impact on VANETs applications.
The remainder of the paper is organized as follows. Section 2 contains a literature review. Section 3 has detail information about system models and goals. The proposed scheme is discussed in Section 4. Formal modeling and specification are given in Section 5. In Section 6, the experimental evaluation is discussed in detail. Section 7 contains the performance comparison of the proposed scheme. The position-mixing method is analyzed in Section 8. Analysis and discussion are specified in Section 9, and finally, the paper is concluded with Section 10.

2. Related Work

This section contains a review of some of the existing privacy protection schemes in the literature. A pseudonym is used in a number of existing privacy schemes instead of the actual vehicle identity in the beacon message. The vehicle broadcasts beacons, which contain a pseudonym that anonymizes the vehicle. However, when using a fixed identifier (pseudonym) in a beacon message for a vehicle trip a privacy danger arises. An adversary can link the pseudonyms of a vehicle with the various locations visited. To protect a vehicle’s privacy, a pseudonym must be periodically changed to prevent an adversary from locating a particular vehicle on the road network. There are several pseudonym changing schemes in the literature. Table 1 contains a comparative analysis of existing location privacy schemes. The detailed taxonomy diagram of location privacy techniques is shown in Figure 1. Some of the existing privacy-preserving strategies are discussed below.
The cryptographic mix zone is established at a road-side intersection in [19], at which vehicles change temporary identifiers. The zone is combined with a mix network to provide pseudonym unlinkability. The vehicles in fixed zones are forced to change pseudonyms. The extended cryptographic zone scheme is proposed in [20] to tackle vulnerability to internal attackers. The RSUs are involved in the pseudonym-changing process. Similarly, in [21], mix zones are created in social spots such as parking lot. The vehicles that are gathered at social places change pseudonyms collectively to hide location information. The concept of a dynamic mix zone is introduced in [22], based on vehicles’ requests. Traffic statistics and privacy requirements determine the size of the zone. The messages communicated in the zone are encrypted to avoid pseudonym linkability. Similarly, in [23], the vehicles form a mix zone dynamically and motivate the neighboring vehicles to take part in the pseudonym change process. A vehicle finds neighboring vehicles a similar status in [24] and exchange pseudonyms with neighbors based on trigger information, thereby confusing an adversary about the actual identity of a vehicle.
Qasim et al. introduced the concept of multiple mix zones [25,26], where the vehicles change pseudonyms dynamically. The pseudonym alteration is based on vehicle direction, displacement, and acceleration. Guo et al. proposed a scheme using an independent mix zone [13] where each vehicle creates some randomized version of pseudonyms to establish an anonymous zone of vehicles on the road network. In [12], fixed mixing zones are establish at road intersections. Vehicles change pseudonyms only at the fixed zone to protect location information under different traffic conditions. However, the scheme creates an extra cost of deployment and suffer from duplicated data. A new concept of creating a silent mix zone is presented in [27,28], where vehicles remain silent and exchanging their pseudonyms under the control of RSU. A distributed pseudonym-changing scheme is proposed in [29], also based on the construction of a silent mix zone. The zones are created based on vehicle traffic density. Location privacy strategies based on the mix zone concept have certain limitations. Firstly the cost of deploying zones at a road intersection requires infrastructure for implementation and of equipment installation, which can be costly. Secondly, in low vehicle traffic density it can be challenging to achieve the necessary level of privacy protection.
In [30,31], the concept of a silent period combined with group navigation is proposed for location privacy in a vehicular network. One of the vehicles is selected as a group leader (GL), and only the GL communicates with the network, while the remaining members of the group remain silent as a technique to hamper pseudonym linkability. Similarly, in [32], the vehicle remains silent under at lower speeds. When a vehicle is traveling at low speed, the probability of road accidents is lower. Based on this concept, a vehicle should keep silent and not broadcast beacon messages, to hamper pseudonyms linkage. A safe distance metric is introduced in [33] that searches radius for obfuscation in which the values of velocity, direction, and position are considered to hide vehicles’ identity. If a vehicle does not find any neighbor at a safe distance, then it remains silent for a random period. In [34], the local parameters of speed and direction are taken as input to update the pseudonym autonomously. The vehicle will change pseudonyms in silent mode to meet a certain traffic threshold; otherwise, it will wait for another cooperative silent period. A context-based scheme is introduced in [17] in which the vehicle entry and exit from a silent period is based on the number of neighboring vehicles and pseudonyms are changed cooperatively. Similarly, in [18], the vehicle waits for at least k silent neighbors before changing the pseudonym. Further, misbehaving vehicles are detected in the network and considered before changing the pseudonym. Another silent period scheme uses the concept of scheme permutation [16], in which vehicles exchange pseudonyms. This increases the confusion of an adversary about the actual location of a vehicle. Limitations of silent period location privacy schemes include that they affect road safety applications; the use of a short silence period provides a way for pseudonyms to be linked, while for a long silent period the adversary may find temporal and spatial relationships to track the location of a vehicle in the network [15].
A path confusion scheme is proposed in [35] that slightly changes the informed positions of two users in proximity. This decreases the probability of vehicle tracking for fixed adversary strength. In [36], to increase adversary confusion in linking pseudonyms of a vehicle, inaccurate beacons are added in between the accurate beacon messages. For using location services, the concept of decoy vehicles is used in [37], in an attempt to protect the location of other vehicles in the network. The decoy vehicle communicates with LBS on behalf of network vehicles. To break the continuous path with LBS in [38], vehicles cooperate to generate plausible locations for each other to conceal/obfuscate the actual location information. Similarly, in [39], the target vehicle takes the surrounding neighboring vehicle’s virtual location dynamically to mislead an adversary about the actual driver route on the road. In [40], a location privacy method based on blockchain is presented that satisfies the requirements of k-anonymity and does not rely on third party server. A route discovery protocol is presented in [41] that helps the source node to find an efficient path to a destination dynamically, and provides privacy protection to a node through a privacy-preserving verification process. A cache-based user location privacy protection scheme is introduced in [42] during communication with LBS. Limitations of using inaccurate data, introduced in these techniques is the impact on road network applications. In addition, extra overhead is introduced into the network due to duplicated data and redundant data.
Table 1. Comparative analysis of existing location privacy schemes.
Table 1. Comparative analysis of existing location privacy schemes.
Ref:Execution ModeEvaluation MetricProcedureAdversary ModelAccountabilityCost of ComputationImpact on Applications
[13]Infrastructure lessAnonymityUsing dummy dataExternal global adversaryNoReducedYes
[17]Infrastructure lessASS, entropy, traceabilitySilent modeGlobal passive adversaryNoNot calculatedReduced
[43]Infrastructure lessProtection rateCooperativeGeneral adversaryNoNot givenYes
[21]Infrastructure-basedASS, location privacy gainIdentity mixingGPANoReducedYes
[24]Infrastructure lessAnonymity, entropy, tracking percentageTriggered-basedExternal passive adversaryYesNot calculatedNo
[33]Infrastructure lessAnonymity, traceabilitySilent modeGlobal passive adversaryNoNot mentionedNo
[36]Infrastructure-basedASS, entropy, traceabilityRoute confusionGeneral attackerNoNot mentionedYes
[44]Infrastructure-basedASSRandom selectionPassive adversaryNoIncreasedYes
[45]Infrastructure lessASS, entropy, tracking probabilitySilent modeGlobal passive adversaryNoReducedYes
[18]Infrastructure lessASS, entropy, confusion, traceabilityScheme permutationGlobal passive adversaryYesNot computedNo
[46]Infrastructure-basedASS, entropy, tracking probabilityCheating detectionGlobal passive adversaryNoNot mentionedYes
[47]Infrastructure lessASS, entropy, tracking probabilityUse dummy dataGlobal passive adversaryNoNot computedYes
In the literature, much attention is given to the mix zone or silent period location privacy schemes; however, the mix zone concept only covers a limited area, and the vehicle privacy is protected only in the zone. In silent period location privacy techniques, vehicles do not broadcast beacon messages, and this can impact on road network applications, and sometimes vehicle change pseudonyms individually in particular road network cases (lower-traffic condition), which provides a way for an adversary to link the old pseudonym with the new one. There are some areas on the road network in which vehicles are moving at high speed and with lower traffic density such as highways or main roads affecting location privacy. Therefore, we propose a new dynamic grouping and virtual pseudonym-changing scheme that can be applied in such a road network scenario.

3. Models and Goals

This section contains the detail of models and goals. The models presented are the system model and the adversary model. The goals of the research paper are also presented and the vehicle registration process is discussed.

3.1. System Model

Our system model consists of three entities: vehicle; Location Based Services (LBS); and Trusted Authority (TA). These are shown in Figure 2. TA is the registration authority that registers and provides certificates to the vehicles. It contains details of vehicle registration data and has a pseudonyms pool to assign to vehicles during registration. TA is considered trusted in our system model, does not compromise the privacy of vehicles. LBS is a location service provider that makes available various locations of interest to vehicles. For example, if a vehicle requires the nearest hospital or restaurant location, it can a request to LBS. However, LBS is not a trusted entity in the system model and can assist an adversary in compromising vehicles’ location. The third entity in the system model is the vehicle that is moving on the road, and our prime concern in this research is to provide location privacy to it. The vehicle is equipped with an OBU, which keeps a record of all events during a vehicle’s journey on the road network. The data in the OBU is given security with the help of a tamper-proof device. For the precise location data, the vehicle utilizes GPS.

3.2. Adversary Model

In this research, we take a robust adversary model. It consists of an external Global Passive Adversary (GPA), which covers a large part of the network by deploying low-cost transceivers. Figure 3 shows the coverage area of the GPA, which analyzes the data collected from various vehicles moving on the road network. The GPA can eavesdrop on any messages communicated within its coverage [29]. The primary objective of the GPA is tracking or collecting vehicle location traces during a trip on the road using captured beacon messages [48]. The compromising of location privacy requires the de-anonymization of vehicle location tracks. The de-anonymization is successful if the attacker correctly reconstructs the location traces. The GPA tries to correlate the beacon messages of old and new pseudonyms for vehicle identification. The adversary tries to match the pseudonyms of vehicles at the various visited locations. We assume that the adversary can also obtain the location data of vehicles from LBS. Our scheme will provide protection both against GPA and LBS adversary.
The adversary can capture beacon messages broadcast during the vehicle’s journey on the road at the time. The beacon contains vehicle identity, position, and speed. In the proposed scheme, we use G I D instead of the pseudonym in the beacon message. The adversary captures the beacons of vehicles at time t and collects vehicles traces that contain information such as group identity, pseudonym, vehicle position and speed (S). Hence, the collected traces of data of different vehicles at time t is given by:
T r = i = 1 n ( ( G I D ( P I D ) , P O S , S ) V i .
where T r is the initial traces collected by an adversary, G I D is group identity, P I D is pseudo-identity of a vehicle, P O S is the current position and S is the speed of a vehicle V i . Over time the vehicle changes position and pseudonyms for privacy protection. At time t the adversary collects another trace of various vehicles moving on the road that consists of vehicles pseudonyms, position and speed. The next set of traces T r collected by the adversary is given by the following equation:
T r = j = 1 n ( ( G I D ( P I D ) , P O S , S ) V j .
After collecting both traces, the GPA can analyze the vehicle data and try to identify the target vehicle. The traces of information contain only G I D , location, and speed of the vehicle, where P I D is changed inside the group of vehicles. The following equation states the analysis process of GPA:
A n a l y s i s ( G P A ) = i = 1 n M a t c h i n g ( T r , T r ) V i .
Now the GPA will try to link pseudonyms of a target vehicle at various locations based on the vehicles collected traces at different periods. Here, the adversary takes probability P r of matching the pseudo-identities of vehicle in the collected traces. The linking of vehicles pseudonyms at different locations is considered by the adversary and can be described as follows:
A n a l y s i s ( P I D , P O S ) = i = 1 n P r [ ( P I D , P O S ) t ( P I D , P O S ) t V i ]
The vehicle communicates with LBS for the nearest location of interest. The location message contains group identity and vehicle location. The adversary captures the location data during this communication. The captured location data of vehicles by an adversary is given below:
C a p t u r e ( L O C ) = i = 1 n M S G ( G I D , L O C ) V i .
After collecting information about different vehicles during communication with LBS, the adversary starts to analyze it. The adversary matches pseudo-identities of vehicles at different locations and tries to extract a target vehicle’s actual identity and locations. The overall prediction of the GPA for identifying the target vehicle is stated in the following equation.
A n a l y s i s ( O v e r a l l ) = i = 1 n P r [ ( G I D ( P I D , L O C ) t G I D ( P I D , L O C ) t V i ] .

3.3. Goals

The main concern of this article is to protect the location privacy of vehicles in a vehicular network. We set the following goals in this research work.
  • Construction of dynamic grouping of vehicles at diverse nature of road network.
  • Virtual pseudonym change scheme in case of lower vehicle traffic.
  • Protection of a vehicle location information while querying to LBS.
  • Reduce the impact of privacy on VANETs applications.
  • Create uncertainty for an adversary to link the pseudonyms of a vehicle at different locations.

3.4. Vehicle Registration

Before, initial road network deployment vehicles must register with a Trusted Authority (TA). The TA is a governmental authority that provides certificates to the vehicles at the time of registration. The vehicle registration is shown in Algorithm 1. First, the vehicle will request from TA the registration that binds the vehicle to vehicle identity, License Plate Number (LPN), and other necessary items. Upon successfully verifying LPN, the TA issues certificates to the requesting vehicle; otherwise, the invalid LPN vehicle request is rejected. The TA provides a set of P pseudonyms P U i , k to the vehicles, where k belongs to (1...P) that are public-key certificates. The beacon message is signed with a private key of the sender’s vehicle in connection with pseudonyms for proper authentication. When a message is broadcast by a vehicle in a region to disseminate road status information, upon reception of the message, the receiver vehicles in the vicinity can verify a sender’s vehicle authenticity with its public key [46,49]. The pseudonyms are used for a short period to protect the identity of vehicles. Pseudonyms have an expiry time, and after the expiration, the vehicle may request another pseudonym pool. In our case, we set a pseudonym pool for long periods, i.e., for a number of days (week/month).
Algorithm 1 Vehicle Registration.
Initialization: V e h i c l e ( i ) : Any vehicle i request for registration, V I D : Vehicle identity, L P N : License Plate Number, P s e u d o I D : Pseudonym identity of a vehicle
E x p i r y ( P s e u d o I D ) : The vehicle monitors pseudonyms pool expiry, V a l i d ( L P N i ) : Validity of vehicle LNP is checked, I s s u e n c e ( P U i , k , P ) : issue certificate with pseudonym pool
Input: V I D , L P N
Output: Issuance of Certificate to vehicle
  1:
for V e h i c l e ( i ) = 1 n do
  2:
     R e q u e s t i ( V I D , L P N ) T A
  3:
    TA Verify ( L P N i )
  4:
    if  V a l i d ( L P N i )  then
  5:
            I s s u e n c e ( P U i , k , P )
  6:
    else
  7:
           Discard ( R e q u e s t i )
  8:
    end if
  9:
    Check E x p i r y ( P s e u d o I D )
10:
    if  E x p i r e ( P s e u d o I D )  then
11:
           Go to step 2
12:
    else
13:
           Continue Usage of certificate
14:
    end if
15:
end for

4. Proposed Solution

This section contains the detail of the proposed scheme. It is a group-based location privacy scheme in the case of a vehicular network. There are some road network scenarios where vehicles have high speed and may have lower or higher traffic conditions. We proposed a new Dynamic Grouping and Virtual Pseudonym (DGVP) changing scheme for location privacy preservation. The proposed scheme is adaptive that considers the number of vehicles in transmission range. We consider also the velocity range, to make a group of vehicles to change the pseudonyms cooperatively. One of the vehicles is selected randomly as Group Head (GH) that will monitor all the vehicles’ change of pseudonyms in the group. This kind of situation usually occurs on a main road where vehicles are moving at high speed. The group of vehicles is formed based on similar velocity range and same direction. The block diagram of the proposed scheme is shown in Figure 4. The GH collects information about transmission range vehicles and allows them to join the group. After that, the pseudonym change process is initiated. Pseudonyms of vehicles in the group are changed based on the number of neighboring vehicles. The neighbor threshold is used to apply the cooperative pseudonym update process or the virtual pseudonym update process. The proposed scheme’s main components are vehicle grouping, pseudonym-changing protocol, and vehicle to LBS communication.

4.1. Vehicle Grouping

Once a GH has been selected, its identity is verified with the help of the certificate provided at the time of registration. The selection of GH vehicle detail is given in Algorithm 2. The GH-selection notification and group communication are shown with the help of Figure 5. The GH selection is announced in the vicinity, and the transmission range vehicles request to GH to join the group. Before joining the group, GH authenticates vehicles through a signature scheme (certificates assigned to vehicles by TA). GH prohibits the joining of any vehicle with an invalid certificate. In this way, vehicles with malicious intent could not join the group. A group identity ( G I D ) is created and distributed through the group. All the communication in the group is verified with G I D . The GH informs the members of the group about the pseudonym change process. For this purpose, a flag is set to 1, which means ready for pseudonym change. When all the group members change pseudonyms, and the flag is set to 0, the pseudonym is changed successfully. The detail of the vehicle group formation protocol is given in Algorithm 3. First, the vehicles in the transmission range identified. Next, the signature verification process is started for vehicles joining in the group. Out of range vehicles will not take part in the group formation and communication process.
Algorithm 2 Group Head Selection
Initialization: V e h i c l e ( i ) : Any vehicle on the road, P s e u d o E x p i r y ( i ) :Pseudonym expiration of vehicle i, G H : Group Head, S e n d G H s e l c t i o n ( i ) : Send vehicle i to TA for GH selection
Input: Vehicle pseudonym
Output: Selection of G H
  1:
for V a v e h i c l e ( i ) do
  2:
     P s e u d o E x p i r y ( i )
  3:
     S e n d G H s e l c t i o n ( i ) T A
  4:
    Verification Process
  5:
    if  V e h i c l e ( i ) V a l i d C r e d e n t i a l  then
  6:
          Random selection of V e h i c l e ( i ) as G H
  7:
    else
  8:
          Discard
  9:
    end if
10:
end for
11:
Return( G H )
Algorithm 3 Vehicle Grouping
Initialization: V i : Any vehicle i moving on the road, G H : Group Head, T x : Transmission range, G I D : Group identification, V L R : Vehicle velocity range, D: Direction, P s e u d o E x p i r y ( V i ) : Vehicle pseudo i d expiration, V e r i f i c a t i o n ( G H ) : Verification of group head, N e i g h v e h i c l e R a n g e ( i ) : Neighbor vehicle i is in transmission range, S i g n ( V i ) : Signature of vehicle i, V a l i d ( C ) : Certificate validity, Group ( V i ) : Grouping of vehicle i, Discard-joining ( V i ) : Discard-joining of vehicle i in the group
Input: V L R , T x , D
Output: Group formation and communication process
  1:
for all V i = 1 n  do
  2:
      Check P s e u d o E x p i r y ( V i )
  3:
       G r o u p H e a d ( )
  4:
      Set flag to 1
  5:
       V e r i f i c a t i o n ( G H )
  6:
       N e i g h b o r F u n c t i o n ( )
  7:
      for each V e h i c l e ( i ) V L R  do
  8:
            if  N e i g h v e h i c l e R a n g e ( i ) T x  then
  9:
                 Process of authentication
10:
                 if  S i g n ( V i ) V a l i d ( C )  then
11:
                        G H allows joining V i
12:
                        G H distribute G I D to V i
13:
                       Group ( V i )
14:
                 else
15:
                       Invalid-certificate
16:
                       Discard-joining ( V i )
17:
                 end if
18:
            else
19:
                 Out of range
20:
            end if
21:
      end for
22:
      Return (Members)
23:
      Ready for Pseudonym change process
24:
end for

4.2. Pseudonym-Changing Protocol

In this section, we discuss the pseudonym-changing protocol of vehicles on the road network. The GH will monitor the number of neighboring vehicles in the group. A threshold is set for the maximum number of neighboring vehicles to change pseudonyms using road context information. The road context information includes vehicle velocity range, transmission ranges, number of neighbors in the vicinity. First, the neighbor function is applied to check the number of transmission range neighbors. After that, the neighbor threshold is verified before executing the pseudonym-changing process. Suppose the number of neighbors is greater than or equal to a threshold, then the GH disseminates information in the group to change pseudonyms cooperatively. Otherwise, the GH will announce the virtual pseudonym change process that is shown in Figure 6. The GH will select a few vehicles for a virtual pseudonym change. The chosen vehicles generate duplicate pseudonyms in the group and create a crowd of virtual vehicles in the vicinity. Algorithm 4 contains the detail of the pseudonym-changing protocol. The pseudonym-changing protocol is divided into two sections, i.e., the normal pseudonym update process and the virtual pseudonym update process.
Algorithm 4 Pseudonym-Changing Protocol
Initialization: V i : Any vehicle i, N e i g h C o u n t : Number of neighboring vehicles, N e i g h T h r e s h o l d : Threshold for several transmission range vehicles, T x : Vehicle transmission range, V L R : Velocity range, P s e u d o U p d a t e ( V i ) : Change the pseudonyms of vehicle i, V i r t u a l i z e r ( V i ) : Vehicle i take part in virtual pseudonym change process, P s e u d o n E x p i r y ( t ) : Pseudonym expiry time, N F : Neighbor Function, V e r i f y A u t h e n t i c i t y ( V i ) : Verification of vehicle i authenticity, Calculate Distance ( G H , V i ) : distance calculation between GH and vehicle i, D i s t a n c e V i ( m i n i m u m ) : Vehicle with minimum distance with GH
Input: V L R , T x , N e i g h T h r e s h o l d
Output: Successful change of pseudonym and anonymization in the group
  1:
for all V i = 1 V e l o c i t y R a n g e  do
  2:
       N F ( V L R , T x , G I D )
  3:
      if  N e i g h C o u n t N e i g h T h r e s h o l d  then
  4:
             V e r i f y A u t h e n t i c i t y ( V i )
  5:
             P s e u d o U p d a t e ( V i )
  6:
            Set flag to 0
  7:
      else
  8:
             G H notify virtual change process in the group
  9:
            for  V i G r o u p ( G H )  do
10:
                 Calculate Distance ( G H , V i )
11:
                 if  D i s t a n c e V i ( m i n i m u m )  then
12:
                       Select V i r t u a l i z e r ( V i )
13:
                 else
14:
                       Go to step 10
15:
                 end if
16:
            end for
17:
             V i r t u a l i z e r ( V i ) Messages creation
18:
             M s g 1 ( P s e u d o i d 1 , V L 1 , P O S 1 )
19:
             M s g 2 ( P s e u d o i d 2 , V L 2 , P O S 2 )
20:
             P s e u d o U p d a t e [ V i ( M s g 1 , M s g 2 ) ]
21:
            Set flag to 0
22:
      end if
23:
       P s e u d o n E x p i r y ( t )
24:
      Set flag to 1 and go to step 2
25:
end for
The neighbor function is used to find the number of transmission range neighbors in the concerned region. The neighbor function is shown in Algorithm 5. Vehicles broadcast beacon messages for road status information. The messages are received by each transmission range vehicle. The algorithm takes velocity range, transmission range, and distance as input.
Algorithm 5 Neighbor Function
Initialization: V i : any vehicle i, T x : Transmission range, S P R : Speed Range, D: Direction of a vehicle, C o u n t V I D : Counting of number of vehicles, M e s s a g e R e c e i v e d ( M i ) : Receiving message from vehicle i, Check( V I D , D , S P R ): Checking of vehicle identity, direction and speed range, Calculate Distance ( V i , V j ) : Distance calculation between neighboring vehicles
Input: S P R , T x , D
Output: Number of transmission range vehicles ( C o u n t V I D )
  1:
for V i = 1 n do
  2:
       M e s s a g e R e c e i v e d ( M i )
  3:
      Check( V I D , D , S P R )
  4:
      Calculate Distance ( V i , V j )
  5:
      if  ( V I D V I D ( i ) a n d D i s t a n c e < = 300 m )  then
  6:
             C o u n t V I D + +
  7:
      else
  8:
            Check again(Limit)
  9:
      end if
10:
end for
11:
Return ( C o u n t V I D )

4.2.1. The Normal Pseudonym Update Process

The pseudonym update process takes road context information such as vehicle velocity range, direction, and transmission range neighbors. The GH will monitor the road environment for the change of the pseudonym process. The number of neighboring vehicles is calculated with the help of Algorithm 5. Once the N e i g h T h r e s h o l d is met, the GH announces the group formation protocol for the collective pseudonyms change process as discussed in Section 4.1. Initially, each vehicle will set a flag value to 1, which means it is ready for the pseudonym updating process. A timer is used to trigger every member of a group to change pseudonyms simultaneously. After changing pseudonyms, the member vehicle notifies the GH and sets its flag value to 0, which means pseudonyms are successfully updated. The flow diagram of the pseudonyms update process at certain road context information is shown in Figure 7.

4.2.2. The Virtual Pseudonym Update Process

The successful anonymization process of a target vehicle depends on the number of vehicles taking part in the pseudonym-changing process. If the vehicle traffic density does not fulfill the requirement for the protection of vehicles’ identity, there is a need for a suitable process that provides identity protection. We use a virtual pseudonym update process for the anonymization of vehicle identities in such a case. If the vehicle neighbor threshold is not satisfied, GH notifies the group’s virtual pseudonym change process. Each vehicle in the group will create two messages with different pseudo-IDs, velocities, and location positions. These messages are broadcast in the group with the same G I D . This will hide the actual pseudonym of a vehicle during the grouping period. The virtual pseudonyms update process flow is shown in Figure 8.

4.3. LBS Communication

During a journey some vehicles will require the locations of places of interest such as the nearest shopping mall, restaurant, hospital, etc; a vehicle makes to request to an LBS. On obtaining a location query from the vehicle, the location service provider will respond to the concerned vehicle. In this research, LBS is not a trusted entity and may conspire with an adversary to compromise the location tracks of a vehicle. Figure 9 shows the adversary scenario capturing location data during vehicle communication with LBS. In this case, there is a need to safeguard the location traces of a vehicle. To protect the location’s traces of a vehicle in such a situation, we use a position-mixing procedure. The position-mixing algorithm requires two parameters, i.e., G I D and position coordinates of neighbors in the transmission range. The G I D hides the target vehicle’s actual identity. The vehicle will take the position coordinates of its neighbor randomly and will exchange its location position with it. The exchange of position coordinates mixes the target vehicle’s precise location with its neighbor. The basic position-mixing algorithm is given in Algorithm 6. First, the target vehicle will calculate the distance with each neighbor members of the group. A neighbor with a maximum distance range is selected for position coordinates exchange. For example, a vehicle V i finds another vehicle V j , with a maximum distance range so that V i will take V j as a position mixer vehicle in the group.
Algorithm 6 Position-Mixing Method
Initialization: V i : Any vehicle i, G I D : Group identification, P O S i : Position coordinates of vehicle i, P O S i : Position coordinates of vehicle i, D i s t a n c e ( M a x ) : Take neighbor vehicle with maximum distance range, R a n d o m S e l e c t i o n ( V j ) : Random selection of any vehicle j as a position mixer, Exchange ( P O S i , P O S j ) : Exchange of position coordinates between T x vehicles
Input: G I D , position coordinates
Output: Mixing position coordinates
  1:
for V i = 1 n do
  2:
       N e i g h b o r F u n c t i o n ( )
  3:
      Calculate D i s t a n c e ( V i , V j )
  4:
      if  D i s t a n c e ( M a x )  then
  5:
            Select ( V j ) as a mixer
  6:
      else
  7:
             R a n d o m S e l e c t i o n ( V j )
  8:
      end if
  9:
      Take V i ( G I D )
10:
      Exchange ( P O S i , P O S j )
11:
      Ready Message ( G I D , P O S j )
12:
      Query ( G I D , P O S j ) to LBS
13:
end for
The location position coordinates are exchanged between these two vehicles. Both the vehicles will send their queries with G I D and mixing positions to LBS for the nearest location of interest. On receiving location requests, the location provider will respond to each vehicle. The location request messages contain real position coordinates and the same group identities. Suppose someone (adversary) conspires with the location provider and wants to find a vehicle’s status; he/she (adversary) will find it challenging to identify a vehicle based on the position-mixing method because the location request message which contains a group identity that hides the actual vehicle and location coordinates of a neighboring vehicle protects the target vehicle’s location position. The flow procedure of query to LBS is shown with the help of Figure 10. If the distance ranges of a vehicle with neighbors are the same, it will randomly select one of these neighbors to participate in the position exchange process.

5. Formal Modeling and Specification

High-Level Petri Nets (HLPN) can be used for simulation of the proposed scheme or to provide a mathematical representation to analyze the behavior and structure properties of the proposed model [50]. The benefits of the formal model are the proposed model components and processes interconnections, information flow among the system processes, and information processing task are considered. HLPN consists of seven tuples that are:
  • P is a set of places.
  • T denotes a set of finite transitions such that ( P T = ) .
  • F is a flow relation from place to transition and vice versa, i.e., F ( P × T ) ( T × P ) .
  • φ is a mapping function that maps places to data types such that φ : P Datatypes.
  • R denotes the set of rules that maps T to a logical formula, i.e., R : T Formula.
  • L presents the labels maps on each flow in F such that L : F Label.
  • M 0 denotes an initial state where the flow can be initialized, i.e., M : P Token.
In this section, we formally define and model the proposed algorithm, virtual grouping, and pseudonym-changing. Then we formally model and specify the attacker scenario on the DGVP scheme. In the third subsection, we design HLPN for the position-mixing algorithm and its attacker scenario.

5.1. Formal Modeling of Dynamic and Virtual Pseudonym-Changing Scheme

We formally define and analyze our proposed scheme DGVP in this section. The HLPN of the proposed DGVP scheme is shown in Figure 11, which contains details about the registration process, GH selection, vehicle grouping, and pseudonym-changing mechanisms. Table 2 includes a description of symbols used in the HLPN, while Table 3 describes the places used in the Petri nets.
Before joining the network, each vehicle must register with the Government Authority, i.e., TA. Each vehicle direct requests TA with their identity and LPN as given in Equation (7). TA verifies the vehicle data provided by the VRD authority in Equation (8). After the verification of a vehicle, TA provides certificates in Equation (9).
R ( Registration ) = i 2 x 2 i 3 x 3 | i 2 [ 1 ] i 3 [ 1 ] x 3 : = x 3 { i 2 [ 1 ] , i 3 [ 2 ] , i 3 [ 3 ] , i 3 [ 4 ] } .
R ( Verify Vdata ) = i 4 x 4 i 5 x 5 | ( i 4 [ 1 ] = i 5 [ 1 ] i 4 [ 2 ] = i 5 [ 2 ] ) = V e r i f i e d x 5 : = x 5 { i 4 [ 1 ] , i 4 [ 2 ] , i 4 [ 3 ] } .
R ( Issue Cert ) = i 6 x 6 i 7 x 7 | M a t c h ( i 6 [ 1 ] , i 7 [ 1 ] ) = T r u e x 7 : = x 7 { i 7 [ 2 ] , i 7 [ 3 ] , i 7 [ 4 ] , i 7 [ 5 ] } .
In Equation (10), the TA discards the request of a vehicle with invalid credentials. The vehicle continuously checks the expiry of certificates. On the meeting certificate expiry condition as given in Equation (11), the vehicle requires another certificate because it cannot take part in communication in the network with an invalid certificate. For this purpose, the vehicle requests (Equation (12)) for another certificate.
R ( Verify Fail ) = i 8 x 8 i 9 x 9 | ( i 8 [ 1 ] i 9 [ 1 ] i 8 [ 2 ] i 9 [ 2 ] ) = W r o n g C r e d e n t i a l s x 9 : = x 9 { i 9 [ 3 ] } .
R ( CertExpire ) = i 10 x 10 i 11 x 11 | ( i 10 [ 1 ] = i 11 [ 1 ] i 10 [ 4 ] = E x p i r e ) R e q u i r e d ( { i 11 [ 3 ] } ) .
R ( CertRequest ) = i 12 x 12 i 13 x 13 | ( i 12 [ 1 ] = i 13 [ 1 ] S t a t u s ( i 12 [ 4 ] ) = R e q u i r e d ) R e q u e s t ( { i 13 [ 1 ] , i 12 [ 3 ] , i 12 [ 4 ] } ) .
A pseudonym validity is checked in Equation (13); if a vehicle pseudonym has not reached its expiry period, it will continue to broadcast with a valid pseudonym. Otherwise, the vehicle will take another pseudonym from its pseudonym pool. For the change in pseudonym, the GH-selection process is taken in Equation (14). TA can verify the credentials of the GH vehicle in the selection process. Multiple vehicle data is sent to the TA for the GH selection, and one of the vehicles is selected as the GH randomly. In Equation (15), the vehicle with invalid credentials is discarded in the GH-selection process.
R ( ValidPseudo ) = i 14 x 14 i 15 x 15 | ( i 14 [ 2 ] = i 15 [ 1 ] i 14 [ 4 ] E x p i r e ) x 15 : = x 15 { i 15 [ 2 ] , i 15 [ 3 ] } .
R ( GH Selection ) = i 16 x 16 i 17 x 17 i 18 x 18 | ( i 16 [ 1 ] = i 17 [ 1 ] i 16 [ 2 ] = T i m e E x p i r e ) R a n d o m ( i 18 [ 1 ] ) x 17 : = x 17 { a s s i g n ( i 17 [ 2 ] ) , i 17 [ 4 ] } .
R ( GHSelectionFail ) = i 19 x 19 i 20 x 20 | ( i 19 [ 1 ] = i 20 [ 1 ] i 19 [ 4 ] = I n v a l i d ) D i s c a r d ( x 20 : = x 20 { i 20 [ 3 ] } ) .
After the GH selection, the grouping of vehicles is started. The vehicles add a request to GH for joining the group, as given in Equation (16). The transmission range vehicles may take part in joining the group. The request may pass or fail depending on the verification of a vehicle. In Equation (18), the GH will prohibit a vehicle joining if it has invalid certificates or other credentials. If it has a valid certificate, the vehicle is allowed to join the group, as shown in Equation (17). In Equation (19) on joining the group, the GH will provide Group Identity (GID) to the vehicles.
R ( RequestJoining ) = i 21 x 21 i 22 x 22 | ( i 22 [ 2 ] , i 22 [ 3 ] ) = I n R a n g e ) R e q u e s t ( x 22 : = x 22 { i 21 [ 2 ] } ) .
R ( RequestPass ) = i 23 x 23 i 24 x 24 | ( i 23 [ 2 ] , i 23 [ 2 ] ) ( i 24 [ 2 ] , i 24 [ 3 ] ) I n R a n g e ( x 24 : = x 24 { i 24 [ 4 ] V a l i d } .
R ( RequestFail ) = i 25 x 25 i 26 x 26 | ( i 25 [ 1 ] i 26 [ 1 ] i 25 [ 4 ] = I n v a l i d ) D i s c a r d ( x 26 : = x 26 { i 26 [ 3 ] } ) .
R ( GroupJoining ) = i 27 x 27 i 28 x 28 | C o m p a r e { ( i 27 [ 2 ] , i 27 [ 3 ] ) ( i 28 [ 3 ] , i 28 [ 4 ] ) } I n R a n g e A s s i g n G I D ( x 28 : = x 28 { i 28 [ 2 ] } .
After group formation, the neighbor function (NF) is used to count the number of vehicles in the group as specified in Equation (20). The NF will calculate the number of transmission range neighbors in the group. The neighbor threshold is checked in Equation (21) whether to go for a simple pseudonym change or virtual pseudonym change process. On satisfying the neighbor threshold, the message ready for the pseudonym change process is circulated in the group, as stated in Equation (22). The pseudonym change notification is broadcast to the group, and all the vehicles will set the flag value to 0 as specified in Equation (23). The success indicator shows that all the vehicles have successfully changed pseudonyms.
R ( NCount ) = i 29 x 29 i 30 x 30 i 31 x 31 | ( i 30 [ 2 ] i 31 [ 2 ] ) i 29 [ 2 ] C a l c u l a t e ( i 30 [ 5 ] , i 30 [ 6 ] ) ( x 31 : = x 31 { i 31 [ 3 ] , i 31 [ 4 ] } .
R ( ThreshSuccess ) = i 32 x 32 i 33 x 33 | ( i 32 [ 2 ] = i 33 [ 2 ] i 32 [ 4 ] = i 33 [ 3 ] ) I n d i c a t i o n ( x 33 : = x 33 { i 33 [ 4 ] } .
R ( Circulation ) = i 34 x 34 i 35 x 35 | ( i 34 [ 4 ] = i 35 [ 3 ] ) N o t i f y ( x 35 : = x 35 { i 35 [ 4 ] } .
R ( Updating ) = i 36 x 36 i 37 x 37 | ( i 36 [ 2 ] = i 37 [ 2 ] i 37 [ 3 ] = S u c c e s s ) C h a n g e F l a g ( x 37 : = x 37 { i 37 [ 4 , i 37 [ 5 ] } .
In Equation (24), it is shown that the number of transmission range vehicles threshold is not satisfied, then the virtual pseudonym change process is started. The selection of a suitable neighbor depends on the distance between vehicles. First, the distance between neighboring vehicles is calculated, as stated in Equation (25). The distance ranges are compared and checked the minimum distance between every two neighbors, as specified in Equation (26). In Equation (27), the parameters are set for the selection of virtualizer in the group. Each vehicle in the group creates two messages with different pseudonyms, velocity ranges, and locations. These messages are broadcast to the group, as shown in Equation (28).
R ( ThreshFail ) = i 38 x 38 i 39 x 39 | ( i 38 [ 2 ] = i 39 [ 2 ] i 38 [ 4 ] = F a i l ) x 39 : = x 39 { i 39 [ 3 ] , i 39 [ 4 ] } .
R ( NeighSelection ) = i 40 x 40 i 41 x 41 | ( i 41 [ 1 ] i 40 [ 3 ] = N e i g h b o r s ) C a l c u l a t e ( x 41 : = x 41 { i 41 [ 3 ] } ) .
R ( MinDist ) = i 42 x 42 i 43 x 43 | ( i 42 [ 2 ] = i 43 [ 2 ] i 42 [ 3 ] = M i n i m u m ) x 43 : = x 43 { i 43 [ 3 ] } ) .
R ( Virtualizer Selection ) = i 44 x 44 i 45 x 45 | ( i 44 [ 2 ] = i 45 [ 2 ] i 45 [ 1 ] i 44 [ 3 ] ) M s g C r e a t i o n ( x 45 : = x 45 { i 45 [ 3 ] , i 45 [ 4 ] } ) .
R ( Broadcast ) = i 46 x 46 i 47 x 47 | ( i 46 [ 2 ] = i 47 [ 2 ] B r o a d c a s t ( i 46 [ 3 ] , i 46 [ 4 ] ) ) x 47 : = x 47 { i 47 [ 3 ] , i 47 [ 4 ] } .
On the successful pseudonym update process, every vehicle’s flag value in the group is set to 0, as specified in Equation (29). Now again, the pseudonym validity of a vehicle is monitored. If a vehicle’s pseudonym is about to expire, and the vehicle is currently out of range of a group. In this situation, the group formation protocol is activated again for the pseudonym change process, as specified in Equation (30). The vehicle in the range of a group will reset the flag value to 1; it indicates ready for the pseudonym-changing process again, as stated in Equation (31).
R ( Flag setting ) = i 48 x 48 i 49 x 49 i 50 x 50 | ( i 48 [ 4 ] i 49 [ 5 ] ) = 0 S u c c e s s f u l x 50 : = x 50 { i 50 [ 4 ] } .
R ( OutofRange ) = i 51 x 51 i 52 x 52 | ( i 51 [ 2 ] O u t R a n g e i 51 [ 4 ] E x p i r e ) x 52 : = x 52 { i 52 [ 1 ] , i 52 [ 2 ] , i 52 [ 3 ] } .
R ( PseudoExpiry ) = i 53 x 53 i 54 x 54 | ( i 53 [ 3 ] = 1 i 51 [ 4 ] E x p i r e ) R e s e t ( x 54 : = x 54 { i 54 [ 5 ] , i 54 [ 6 ] } ) .

5.2. Formal Modeling and Analysis of Attacker Scenario on Pseudonym-Changing Protocol

We formally model and analyze the adversary scenario on the pseudonym-changing protocol. Figure 12 shows the HLPN for the attacker scenario that consists of two entities, i.e., pseudonym-changing protocol and an adversary. The symbols used in HLPN are described in Table 4, while the places used in Petri nets are shown in Table 5. The first transition input is taken from the neighbor function and put into place NT. The input transition contains data about vehicle neighborhoods, such as the number of transmissions range neighbors, the status of vehicle pseudonyms, group information, and group identity. NT in the Petri net takes input the number of neighbors for satisfying the neighbor threshold. In Equation (32), the neighbor threshold is met, and the concerned pseudonym update process is started.
A pseudonym-changing alert is disseminated if vehicles are in the same group (Equation (33)). All vehicles become ready for pseudonym change. In Equation (34), the pseudonym updating process is started, and vehicles change pseudonyms collectively to anonymize pseudo-identities in the group. This creates confusion for an adversary trying to identify the target vehicle.
R ( Satisfy ) = i 2 x 2 i 3 x 3 | ( i 2 [ 2 ] = i 3 [ 2 ] i 3 [ 4 ] = T h r e s h o l d ) N o t i f y ( x 3 : = x 3 { i 3 [ 4 ] } .
R ( ReadyNeigh ) = i 4 x 4 i 5 x 5 i 6 x 6 | ( i 4 [ 2 ] i 6 [ 2 ] i 5 [ 2 ] = S a m e G r o u p ) G H A l e r t ( x 6 : = x 6 { i 6 [ 3 ] , i 6 [ 4 ] , i 6 [ 5 ] } .
R ( Updating ) = i 7 x 7 i 8 x 8 | ( i 8 [ 1 ] i 8 [ 2 ] i 7 [ 2 ] i 7 [ 5 ] = 1 ) C o l l e c t i v e U p d a t e ( x 8 : = x 8 { i 8 [ 3 ] , i 8 [ 4 ] } .
If the neighbor threshold is not satisfied, then the virtual pseudonym change process is started as specified in Equation (35). The GH selects a few members for a pseudonym update process. The selected members are verified, and each member starts the creation of the messages with different pseudonyms and location information, as stated in Equation (36). Finally, all the selected members of the group take part in the virtual pseudonym change process. The virtual update process is successfully done, as shown in Equation (37).
R ( VirtualPC ) = i 9 x 9 i 10 x 10 | ( i 10 [ 1 ] i 10 [ 2 ] i 9 [ 2 ] i 9 [ 3 ] < i 9 [ 4 ] ) S e l e c t M e m b e r s ( x 10 : = x 10 { i 10 [ 3 ] , i 10 [ 4 ] , i 10 [ 4 ] } .
R ( Virtualizer ) = i 11 x 11 i 12 x 12 i 13 x 13 | ( i 11 [ 2 ] i 13 [ 2 ] i 12 [ 2 ] ) V e r i f y P s e u d o C r e a t i o n ( x 13 : = x 13 { i 13 [ 3 ] , i 13 [ 4 ] } .
R ( Pupdate ) = i 14 x 14 i 15 x 15 | ( i 15 [ 1 ] i 15 [ 2 ] i 14 [ 2 ] i 14 [ 5 ] = 1 ) V i r t u a l U p d a t e ( x 15 : = x 15 { i 15 [ 3 ] , i 15 [ 4 ] , i 15 [ 5 ] } .
The primary purpose of both the usual pseudonym update and virtual pseudonym update processes is to anonymize the vehicles in a group. When all the group members change pseudonyms successfully, their pseudo-identities are mixed, making it difficult for an adversary to find a vehicle’s identity and location traces on the road network. Equation (38) shows the anonymization of vehicles after the pseudonym-changing process.
R ( Anonymization ) = i 16 x 16 i 17 x 17 i 18 x 18 | ( i 16 [ 5 ] i 17 [ 4 ] ) = 0 A n o n y m i z e d B r o a d C a s t ( x 18 : = x 18 { i 18 [ 1 ] , i 18 [ 2 ] , i 18 [ 3 ] , i 18 [ 4 ] , i 18 [ 5 ] } ) .
After anonymization, each vehicle broadcasts beacons with the new pseudonyms. An adversary has a low-cost transceiver to capture the beacons of vehicles given in Equation (39) and collects vehicle data during the beacons’ broadcast. Based on the vehicle data, the adversary tries to collect two types of information about a vehicle. First, it collects the various location data and tries to match the old location to the vehicle’s new location as specified in Equation (40). Secondly, in Equation (41), the adversary applies a linking attack to link an old pseudonym with a new pseudonym.
R ( BCapture ) = i 19 x 19 i 20 x 20 | ( i 20 [ 1 ] i 20 [ 2 ] i 19 [ 2 ] ) C o l l e c t V D ( x 20 : = x 20 { i 20 [ 3 ] } .
R ( Traces ) = i 21 x 21 i 22 x 22 | ( i 22 [ 1 ] i 22 [ 2 ] i 21 [ 2 ] ) M a t c h T r a c e s ( x 22 : = x 22 { i 22 [ 4 ] , i 22 [ 5 ] } .
R ( PseudoLinking ) = i 23 x 23 i 24 x 24 i 25 x 25 | ( i 23 [ 2 ] = i 25 [ 2 ] i 24 [ 2 ] = i 25 [ 5 ] ) L i n k i n g ( i 24 [ 1 ] , i 25 [ 1 ] ) x 25 : = x 25 { i 25 [ 3 ] , i 25 [ 5 ] } .
The adversary collects vehicle data about location traces and pseudonyms of a vehicle. The pseudonym-changing protocol creates anonymization in the group that increases the confusion of an adversary about the vehicle’s actual pseudonyms. The pseudonym-changing protocol makes it difficult for an adversary to identify a target vehicle in the vicinity.

5.3. Formal Modeling and Analysis of Position-Mixing Method

In this section, we formally model the adversary scenario of the position-mixing method. We design the HLPN of position-mixing algorithm with an attacker scenario shown in Figure 13. The symbols and places used in the HLPN are shown in Table 6 and Table 7, respectively. The HLPN for the position-mixing method takes input transition that consists of data about the vehicle neighborhood, neighbor threshold, and neighboring vehicles’ position coordinates. First, the vehicle will search for a neighbor in the vicinity and select the concerned neighbor as a position mixer.
The neighbor function is used to find transmission range neighbors in the vicinity of a vehicle. Equation (42) shows the success of finding neighboring vehicles and ready to calculate distance among neighboring vehicles. However, the search may be unsuccessful due to the vehicle falling out of range of a group as specified in Equation (43). In Equation (44), the target vehicle will try again to search for vehicles in the transmission range.
R ( FindSuccess ) = i 2 x 2 i 3 x 3 | ( i 3 [ 1 ] i 3 [ 2 ] i 2 [ 2 ] ) x 3 : = x 3 { i 3 [ 3 ] } .
R ( FindFail ) = i 4 x 4 i 5 x 5 | ( i 4 [ 2 ] i 5 [ 2 ] i 4 [ 3 ] i 5 [ 3 ] ) O u t o f R a n g e ( x 5 : = x 5 { i 5 [ 4 ] } ) .
R ( SearchAgain ) = i 6 x 6 i 7 x 7 | ( i 6 [ 2 ] i 7 [ 2 ] ) s e a r c h ( x 7 : = x 7 { i 7 [ 2 ] , i 7 [ 3 ] } .
After finding neighbors in the transmission range, the distance between them is calculated as given in Equation (45). The target vehicle will compare the distance to its neighbors. The neighboring vehicle with maximum distance is selected as a position mixer shown in Equation (46). If the neighbors are in the same distance ranges, then the target vehicle will randomly choose one of the vehicles in its neighbor list specified in Equation (47). In both equations Equations (46) and (47), the selected neighboring vehicle identity is verified with GH’s help.
R ( Distance ) = i 8 x 8 i 9 x 9 | ( i 9 [ 2 ] i 9 [ 3 ] i 8 [ 2 ] ) C a l c u l a t e ( x 9 : = x 9 { i 9 [ 4 ] , i 9 [ 5 ] } .
R ( SelectMax ) = i 10 x 10 i 11 x 11 i 12 x 12 | ( i 12 [ 1 ] = i 10 [ 1 ] i 12 [ 3 ] = i 10 [ 2 ] ) ( i 12 [ 2 ] = i 11 [ 2 ] ) V e r i f y x 12 : = x 12 { i 12 [ 4 ] , i 12 [ 5 ] } .
R ( RandSelect ) = i 13 x 13 i 14 x 14 i 15 x 15 | ( i 15 [ 1 ] = i 13 [ 1 ] i 15 [ 5 ] = i 13 [ 5 ] ) ( i 15 [ 2 ] = i 14 [ 2 ] ) V e r i f y x 15 : = x 15 { i 15 [ 5 ] } .
Once the target vehicle selects its position mixer, the position-mixing procedure is invoked. Each vehicle will take its position coordinates and exchange it with its neighboring vehicle chosen, as shown in Equation (48). The position-mixing query is prepared by each vehicle and sent to the location server as specified in Equation (49). On calculating the location query, the location server responds to the vehicle with the desired location, such as the nearest restaurant, gas station, and hospital locations; see Equation (50).
R ( TakePOS ) = i 16 x 16 i 17 x 17 i 18 x 18 | ( i 16 [ 1 ] i 17 [ 1 ] ) i 18 [ 1 ] ( i 16 [ 3 ] i 17 [ 3 ] ) i 18 [ 2 ] S e l e c t ( i 16 [ 5 ] o r i 17 [ 5 ] ) E x c h a n g e ( x 18 : = x 18 { i 18 [ 3 ] , i 18 [ 4 ] } ) .
R ( SendQ ) = i 19 x 19 i 20 x 20 | ( i 19 [ 1 ] = i 20 [ 2 ] ) Q u e r y R e q u e s t ( x 20 : = x 20 { i 20 [ 3 ] , i 20 [ 4 ] } ) .
R ( Response ) = i 21 x 21 i 22 x 22 | ( i 21 [ 1 ] = i 22 [ 1 ] ) Q u e r y R e s p o n s e ( x 22 : = x 22 { i 22 [ 3 ] } ) .
We assume that the adversary has the strength to capture location messages communicated to a location server. In Equation (51), the adversary can capture the location messages during communication as well as conspire with the location server to get vehicle location data. The adversary performs two things on location messages, namely, identity matching and location matching attack. In Equation (52), the adversary tries to compare a target vehicle’s identities with different timestamps. However, in Equation (53), the adversary launches a location matching attack on vehicle location data. The adversary tries to match the various location traces of a target vehicle.
R ( Conspire ) = i 23 x 23 i 24 x 24 i 25 x 25 | C o m p a r e ( i 23 [ 1 ] , i 24 [ 1 ] , i 25 [ 1 ] ) U p d a t e ( x 25 : = x 25 { i 25 [ 3 ] , i 25 [ 4 ] } ) .
R ( IDMatching ) = i 26 x 26 i 27 x 27 i 28 x 28 | ( i 26 [ 1 ] i 27 [ 1 ] ) i 28 [ 1 ] M a t c h ( i 27 [ 2 ] , i 28 [ 2 ] ) = T r u e x 28 : = x 28 i 28 [ 6 ] .
R ( LOCMatching ) = i 29 x 29 i 30 x 30 | ( i 29 [ 1 ] = i 30 [ 1 ] ) M a t c h ( i 29 [ 5 ] , i 30 [ 5 ] ) = T r u e x 30 : = x 30 { i 30 [ 6 ] } ) .
The adversary is trying to find the different locations visited by a target vehicle while the position-mixing algorithm hides the adversary’s identities and locations. In the position-mixing method, the location requested messages contain the group identity and location coordinates of a neighboring vehicle that hides and mixes a target vehicle with its neighbor, this producing difficulty for an adversary to identify the target vehicle accurately.

6. Experimental Evaluation Setup

The experimental evaluation of our proposed scheme is explained in this section. The first subsection gives a detailed discussion about the simulation setup, and various parameters used for the simulation scenario. In the second subsection, we talk about privacy evaluation metrics in detail.

6.1. Simulation Parameters

We use SUMO for real-world road traffic scenarios. First, the OpenStreet map is used to create a road map of vehicles, as shown in Figure 14. The map is converted to the SUMO network using netconvert and ployconvert tools. The randomTrips python script is used to generate trips for vehicles. Then a vehicle mobility file is created that contains vehicles’ movements on the road network. The proposed scheme is implemented in NS-2. We take 150 vehicles on the road with a speed range between 0–20 m/s. The simulation is run for 300 s. Detail of the simulation parameters are given in Table 8. The results of the proposed scheme are compared with existing schemes CPS [10] and CLPS [18], which are discussed in the coming sections.

6.2. Evaluation Metrics

Various metrics are used to evaluate location privacy in a vehicular network. Most of the existing research work considers anonymity set size, entropy, and traceability. The detail of these parameters is given below.

6.2.1. Anonymity Set Size

The Anonymity Set Size (ASS) is used to measure vehicle location privacy in the vehicular communication network. The ASS means the set of indistinguishable vehicles, including the subject or target vehicle [29]. The purpose of ASS is to anonymize the vehicles in the group of vehicles of similar status. The achieved level of vehicle privacy depends on the anonymization process. The higher the anonymization of vehicles, the higher the privacy protection will be. Our proposed scheme DGVP, combines similar status vehicles in a group and changes pseudonyms simultaneously. The cooperation of vehicles for pseudonym-changing is considered a Poisson process with vehicle arrival rate λ , and X is the random variable that specifies the number of vehicles in a group at a specific time T. The probability of vehicles is computed as given in Equation (54) [46].
P ( X = x ) = ( λ T ) x x ! e ( λ T ) .
λ T the expected number of vehicles that update pseudonyms simultaneously. The expected number of vehicles in a group at time T is specified as:
E ( X = x ) = x = 1 x ( λ T ) x x ! e ( λ T ) = λ T .
The anonymity set of the expected number of vehicles can be calculated as follows:
| A S S | = i , j = 1 n V e h i P s e u d o j = i = 1 n E ( X i = x ) = j = 1 n λ j T .
where V e h i P s e u d o j is the number of vehicles that change pseudonyms simultaneously in the group for anonymization of pseudo-identities.

6.2.2. Entropy of ASS

The entropy value measures an adversary’s confusion level to identify a target vehicle in the group of vehicles. It computes the degree of uncertainty of an adversary to link a target vehicle’s pseudonyms at various locations. To calculate the entropy, let us take V i to be a set of vehicles in a group that takes part in the pseudonym-changing process, and V j is the number of vehicles that update pseudonyms successfully in a group. Let P V i V j be the uniform probability of distribution that measures the level of entropy and confusion for an adversary. The adversary tries to find a link between the used pseudonyms of a vehicle at different periods. The entropy of vehicles at time t can be computed as follows [46].
H t = V i , V j V P V i V j l o g 2 P V i V j .
where H t is the entropy of vehicles in a group, and V is the total number of vehicles. The average entropy H a v g is calculated as follows:
H a v g = 1 V i , j V H t ( i , j ) .

6.2.3. Location Traceability

Location traceability measures the tracking probability of a vehicle being traced at various locations. Traceability is inversely proportional to the level of location privacy. Let T v is the location traceability strength of an adversary to find a vehicle location in a vicinity. Here we measure location traceability in terms of the vehicle anonymity set. The higher the location anonymization, the lower will be the location tracking percentage. T v can be computed as given below [51].
T v = [ 1 P r ( | A S S | ) ] .
The probability of vehicle anonymization is denoted by P r in Equation (59). When T v is equal to 1, the adversary or attacker successfully tracks a vehicle. The vehicle location anonymization procedure reduces the traceability of a vehicle in the concerned region.

7. Performance Comparison

In this section, we compare the simulation results of our proposed scheme DGVP with Context-based Location Privacy Scheme (CLPS) [18] and Coupling Privacy with Safety (CPS) [10] in terms of anonymity, entropy, and location traceability. The average anonymity set size versus simulation time result is shown in Figure 15. The proposed scheme DGVP improves the anonymization of vehicles in the group compared to CPS and CLPS. The enhanced results of vehicle anonymization is due to the efficient management of vehicles in the group for the pseudonym update process. The non-linearity in the results arises because some vehicles may leave the group’s transmission range or join the group dynamically, reducing or increasing the vehicle anonymization process. Similarly, anonymity versus a different number of vehicles is shown in Figure 16. Here, DGVP increases the anonymity of vehicles to improve the location privacy in the vicinity compared with existing schemes CPS and CLPS. The reason for the lower average anonymity of CLPS is the use of a short pseudonym life, which changes individually by a vehicle before the trigger for collaborative pseudonym change. The reduced level of vehicles’ anonymity in CPS is the lack of cooperation among vehicles for pseudonym change. CPS only considers delay for beacon broadcast but does not ensure the cooperative pseudonym update process in the vicinity, reducing vehicles’ anonymity and privacy.
Mean maximum entropy in terms of different periods is shown in Figure 17. DGVP achieves better results than existing schemes CPS [10] and CLPS [18]. The entropy measures an adversary’s confusion level about the target vehicle’s identity in the region of interest. DGVP increases confusion for the adversary to identify a vehicle. This is because of the efficient management of anonymization of vehicles in the groups. Similarly, in Figure 18, the results of mean maximum entropy with varying number of vehicles in the vicinity are presented. Our proposed scheme achieves higher confusion for an adversary in extracting the target vehicle in a group than existing CPS and CLPS. It hides the private information of a vehicle from the adversary. The achieved results of a higher level of location privacy is due to the cooperative pseudonym-changing process. The lack of cooperation for pseudonym-changing among vehicles reduces the entropy of CPS. In CLPS, pseudonyms are changed by a smaller number of vehicles in silent mode, ultimately decreasing the mean maximum entropy value.
Figure 19 shows the vehicle location traceability at different periods. At the start of simulations, the traceability probability is higher; after some time, traceability is reduced with the increasing anonymization of vehicles. The proposed scheme DGVP has a lower traceability probability than existing schemes CPS [10] and CLPS [18]. The location traceability percentage with different vehicle traffic conditions is shown in Figure 20. Here also, DGVP has improved results reducing the vehicle location traceability than CPS and CLPS. The efficient results of DGVP are due to the higher value of anonymization of vehicles on the road network. The anonymization process of DGVP increases the difficulty for an adversary to track the vehicle’s various locations during a journey. CLPS has a lower traceability probability than CPS because of the efficient management of silent periods for hiding actual vehicle identity. While in the CPS scheme, the reduced number of beacon broadcasts and use of a pseudonym for a long period provides more chance for an adversary to track a vehicle.
The successful changes in pseudonyms of vehicles at different periods are shown in Figure 21. The efficient management of the pseudonym-changing process reduces the possibility of linking a vehicle pseudonym at various locations. The comparative results clearly show that the proposed scheme DGVP outperform CPS [10] and CLPS [18] in terms of successful pseudonym-changing. This is because of the cooperation of neighboring vehicles for the pseudonyms changing process. DGVP manages the grouping of vehicles in the vicinity, providing an environment for vehicles to change pseudo-identities successfully. The lack of cooperation among vehicles in the existing schemes CPS and CLPS reduces the change in pseudo-identities, which increases the possibility for pseudonyms linking attack.

8. Position-Mixing Method Results

The vehicle requests LBS for the nearest location of interest; for that purpose, the vehicle shares its position with the location server. We intend to safeguard the location of the vehicle from the third party LBS. In the simulation, we collected the data exchanged with a location server for different groups of vehicles. Figure 22 shows the successful location positions of vehicles exchanged with each other. We take data of three groups to examine the position coordinates exchanged among the vehicles. As shown in the figure, group-1 has a lower number of positions exchanged due to the lower number of vehicles in the group. Group-3 has improved results regarding positions exchanged with neighboring vehicles compared to group-1 and group-2. At different periods, each group has various member vehicles. Over time, the number of vehicles in the group increases, which results in the increased confusion for an adversary to identify a target vehicle in a group. The higher the number of successful positions exchanged in the group, the higher the confusion for an adversary will be.
Figure 23 shows the rate of adversary confusion about the actual location of a vehicle taken from the location server or observed during vehicle communication with LBS. Three group results are shown in the figure to analyze the confusion rate of an adversary. The various groups create different uncertainty while exchanging location information with LBS. Each group has a varied number of member vehicles, which affects the confusion rate. Group-3 has a higher number of vehicles than group-1 and group-2, which ultimately increases uncertainty for an adversary to identify the target vehicle. The number of vehicles in the group is time-variant. With time, more vehicles join the group, increasing anonymity and confusion to extract the vehicle’s actual location.

9. Analysis and Discussion

We examine the proposed scheme DGVP under various factors; protection against GPA, impact on VANETs applications, time complexity, and computation cost. The detail is given in the following subsections.

9.1. Privacy Protection Analysis against GPA

In this research, we consider the GPA that uses a low-cost transceiver to eavesdrop the communication among the vehicles on the road. The adversary catches the beacon messages, which contain pseudo-identity and location of vehicles. It tries to match the vehicle pseudo-identities at various locations. Here, we analyze the strength of the adversary (GPA) in terms of with and without additional knowledge. The additional knowledge of adversary about a vehicle may be frequently visited locations, previous pseudonyms, and vehicle locations of interest. This information increases the strength of an adversary to identify a vehicle. The adversary without additional knowledge has no past information about a vehicle; it only tries to explore the recently collected data to identify the target vehicle. We analyze the privacy protection of our proposed scheme DGVP against the strength of an adversary with and without this additional information. Figure 24 shows the average rate of confusion generated for the adversary at various tracking times. The proposed scheme produces higher confusion or uncertainty for adversaries without extra information compared to an advanced adversary. At the start of the procedure, the adversary confusion rate is low; over time, the confusion rate increases for an adversary to link various pseudonyms of a vehicle in the vicinity. So, both adversaries are facing difficulties in tracking vehicles on the road network. Similarly, Figure 25 contains the results of the average confusion per trace in terms of vehicle density. The confusion rate is lower with fewer vehicles. With an increase in vehicle traffic density, the confusion rate increases. Although an advanced adversary has a lower confusion rate than a simple adversary, the proposed scheme still creates uncertainty for an adversary to identify a target vehicle in the network.

9.2. DGVP Scheme Impact on VANET Applications

The privacy protection mechanism has some impact on VANET applications. The user wants to hide the private information related to his/her location while also wanting to efficiently manage the vehicular network applications. The proposed scheme, DGVP, uses a neighbor’s data to anonymize the identity of the target vehicle. The pseudonyms of vehicles are updated in a grouped manner. Our privacy scheme provides both location and identity protection to the vehicle while considering the smooth function of VANETs applications. We do not change the relative traffic information broadcast during a vehicle journey; however, the vehicles’ meeting areas are explored to obtain an opportunity for protection of location privacy of the target vehicle. The proposed scheme creates confusion for an adversary to identify a vehicle in a group and does not change any information related to VANET applications such as safety and infotainment applications. We take the expectation of an adversary confusion in terms of anonymization of vehicles in a group [35].
E ( A n o n y m i t y ) = 1 M N i = 1 M t = 1 N P i ( t ) [ ( G I D i ( t ) , P s e u d o U p d a t e i ( t ) ) V i ] .
where P i ( t ) is the probability of an adversary to identify a target vehicle in the group. G I D is the group identity assigned at the time of group creation, P s e u d o U p d a t e i is the vehicle pseudonym-changing during the crowd of vehicles, V i is any vehicle moving on the road, M is the number of the vehicles taking part in the anonymization process, and N is the observation time of vehicle data in the vicinity. The quality of applications (QoA) can be defined in terms of confusion or uncertainty as given in the following equation:
Q o A = 1 M N i = 1 M t = 1 N [ V P s e u d o i ( t ) , G I D ( P s e u d o i ( t ) , P s e u d o i ( t ) ) ] V i .
where V P s e u d o i ( t ) is the virtual pseudonym used during a lower number of vehicles in a group, P s e u d o i ( t ) is the initial pseudonym of vehicle and P s e u d o i ( t ) is the change in the pseudonym of a vehicle after time t. In Equation (61), it is clear that the proposed scheme creates confusion for an adversary to link the various pseudonyms of the vehicle at different periods. However, the parameters used for the anonymization of vehicles did not contain any distortion data that reduces vehicular application service quality. Hence, the proposed scheme has a lower impact on the quality of VANET applications.

9.3. Algorithm Complexity

We analyze the complexity of algorithms used in the proposed solution in terms of time. Time complexity is the time taken by algorithms to perform a specific task. Our proposed solution has three main algorithms, i.e., vehicle grouping, pseudonym-changing protocol, and position-mixing method. The reason to calculate the time complexity of algorithms is to identify the proposed solution’s total running time concerning privacy protection. Higher time requirements for privacy scheme certainly affects other services of the VANETs such safety services and infotainment services. The complexity of the algorithms is given below.

9.3.1. Vehicle Grouping Algorithm Complexity

To find the vehicle group algorithm’s time complexity, we must consider the GH-selection process, neighbor selection process, and verification of vehicles to join the group. Let V n is the number of vehicles in the vicinity that takes part in the GH-selection process. The cost of computation of selection of GH takes O ( V n ) . The neighbor function counts the number of transmission vehicles in the group vicinity. Let D n is the distance calculation among neighboring vehicles in the group, then time complexity for the neighbor function is O ( D n V n ) . After this, the GH starts the joining of transmission range vehicles in the group. GH verify each vehicle’s authenticity, let V F n is the cost of the verification process, then the cost of vehicle verification is O ( V F n V n ) . The time complexity of the vehicle grouping algorithm is given below.
T i m e c o m p l e x i t y ( G r o u p i n g ) = O ( V n ) + O ( D n V n ) + O ( V F n V n ) = O ( 1 + D n + V F n ) V n = O ( D n + V F n ) V n = O ( D + V F ) V ( n ) = O ( n )

9.3.2. Pseudonym-Changing Protocol Complexity

The pseudonym-changing protocol takes various road network parameters to update vehicles pseudonyms in a group manner. For the pseudonym-changing algorithm’s complexity, we should consider the selection of virtualizer, messages creation, and pseudonym update process. Let D n be the distance calculation time between GH and group member and V n be the number of vehicles taking part in the virtualizing process; the time complexity of the vehicle virtualizing selection process is O ( D n V n ) . The selected vehicles will create duplicate messages with virtual pseudonyms. Let M S G n be the number of messages designed for the virtual pseudonym-changing process and V n be the vehicles that make duplicate messages, then the computation complexity of messages creation is O ( M S G n V n ) . Now all the group members cooperatively update pseudonyms. Let P I D n be pseudonyms, and V n is the number of vehicle update pseudonyms. The time complexity of pseudonyms update is O ( P I D n V n ) . The overall computation cost of pseudonym-changing protocol is given below.
T i m e c o m p l e x i t y ( P s e u d o U p d a t e ) = O ( D n V n ) + O ( M S G n V n ) + O ( P I D n V n ) = O ( D n + M S G n + P I D n ) V n = O ( D + M S G + P I D ) V ( n ) = O ( n )

9.3.3. Position-Mixing Algorithm Complexity

The position-mixing algorithm computation complexity consists of the position mixer selection and position exchange process between the vehicles. Let D n be the distance calculation cost between vehicles and V n be the number of vehicles taking part in this process. The computation cost of the position mixer selection process is O ( D n V n ) . After the selection of the position mixer, the vehicle starts to exchange position coordinates with each other. Let P S n be the position coordinates exchange between vehicles V n , then the time complexity for the position exchange process is O ( P S n V n ) . The overall time complexity of the position-mixing algorithm is given below.
T i m e c o m p l e x i t y ( P o s i t i o n m i x i n g ) = O ( D n V n ) + O ( P S n V n ) = O ( D n + P S n ) V n = O ( D + P S ) V ( n ) = O ( n )

9.4. Cost of Computation

The cost of computation includes computation latency and vehicle communication latency. The computation latency consists of the time required for group formation, vehicle joining, and other related computations for applying privacy schemes. The communication latency is the time taken by vehicles to communicate with each other for setting up the privacy protection scheme. Figure 26 shows the comparative results of the proposed scheme DGVP and existing schemes CPS and CLPS regarding average computation cost. The CPS requires extra time for distance calculation with RSU, trip time calculation, and pseudonym calculation, which make its computation cost higher than both DGVP and CLPS. The CLPS has a lower computation due to the reduced number of cooperative vehicles in the region. DGVP has modest increase in computation time but provides robust privacy protection compared with CPS and CLPS. The average communication latency at different traffic densities is shown in Figure 27. The communication cost of the proposed scheme DGVP is higher than CLPS but lower than CPS. This is because of communication among the vehicles for the virtual pseudonym process and group communication. The cost of communication of CPS is high due to the communication of vehicles with road infrastructure as well as among the vehicles for the anonymization process. Our proposed scheme achieves improved results regarding vehicle location privacy protection at the cost of a small increase in computation and communication latency.

9.5. Discussion

The protection of location privacy in case of vehicles moving at high speed and lower-traffic conditions is a challenging one. In the existing schemes [10,18], it is difficult to provide a high level of location privacy in diverse vehicle traffic, negatively impact on road network applications and the privacy is provided only inside the communication range of an RSU. We have analyzed the proposed scheme DGVP regarding privacy protection, quality of service, impact on VANET applications, and computation cost. Based on the simulation results, DGVP has improved location privacy protection results compared with [10,18]. The time complexity requires the time taken by components of the proposed scheme such as vehicle grouping, pseudonym update process, and position-mixing algorithm to apply privacy protection mechanism [52]. We calculated the time complexity of the proposed algorithm that shows the running time of these algorithms. The provision of security creates some cost [53]. Our proposed scheme, DGVP, has a slightly increased cost of computation. This increase in the cost of the DGVP is due to the communication and computation of the pseudonym update process and cooperation among neighboring vehicles. Still, overall, the proposed scheme achieves a higher level of vehicle location privacy protection in diverse vehicle traffic. The quality of the VANET applications is not compromised in the case of DGVP because there is no distortion of location data in the proposed scheme. The existing schemes [10,18] utilize a silent period that affects road safety applications.

10. Conclusions

We have proposed a Dynamic Grouping and Virtual Pseudonym (DGVP) changing scheme to protect location privacy in the case of vehicular communication networks. Road context information, such as vehicle speed, position, and the number of neighboring vehicles, is used to form a dynamic grouping of vehicles. The pseudonym update process takes place to change the pseudonyms of vehicles in a grouped manner. In the case of a lower number of vehicles within transmission range, a virtual pseudonym-changing procedure is used. In the virtual pseudonym change method, some randomized version of the pseudonym is created to anonymize the vehicles in the group. We use the position-mixing method to hide the vehicle’s position and identity while communicating with LBS. The DGVP scheme is formally modeled and specified using HLPN. The formal model shows the correctness of the proposed method. The proposed scheme is validated with the help of simulation results with improved anonymity, entropy, reduced location traceability, lower computation cost, and impact on VANET applications. In the future, we are planning to do more experiments on the diverse nature of the road network to explore other parameters for a vehicle’s location privacy.

Author Contributions

Conceptualization, I.U. and M.A.S.; methodology, A.K.; software, I.U.; validation, A.W., M.A.S. and A.K.; formal analysis, I.U. and A.W.; investigation, C.M.; resources, C.M.; data curation, A.K.; writing—original draft preparation, I.U.; writing—review and editing, M.A.S. and A.W.; visualization, I.U. and A.W.; supervision, M.A.S.; project administration, A.K. and C.M.; funding acquisition, C.M. All authors have read and agreed to the published version of the manuscript.

Funding

Carsten Maple gratefully acknowledges the support of the Engineering and Physical Sciences Research Council (EPSRC) through the Academic Center of Excellence in Cyber Security Re-search-University of Warwick under Grant EP/R007195/1, The Alan Turing Institute under Grant EP/N510129/1, Autotrust under Grant EP/R029563/1, and the National Centre of Excellence for the IoT Systems Cybersecurity, PETRAS under Grant EP/S035362/1.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Thanks to Higher Education Commission, Pakistan for supporting academic studies.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sheikh, M.S.; Liang, J. A comprehensive survey on VANET security services in traffic management system. Wirel. Commun. Mob. Comput. 2019, 2019. [Google Scholar] [CrossRef] [Green Version]
  2. Hu, H.; Lu, R.; Huang, C.; Zhang, Z. Tripsense: A trust-based vehicular platoon crowdsensing scheme with privacy preservation in vanets. Sensors 2016, 16, 803. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Ali, Z.H.; Badawy, M.M.; Ali, H.A. A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance. Peer-to-Peer Netw. Appl. 2020. [Google Scholar] [CrossRef]
  4. Kong, Q.; Lu, R.; Ma, M.; Bao, H. Achieve location privacy-preserving range query in vehicular sensing. Sensors 2017, 17, 1829. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
  6. Malhi, A.K.; Batra, S.; Pannu, H.S. Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 2020, 89. [Google Scholar] [CrossRef]
  7. Zhang, C.; Zhu, L.; Xu, C.; Du, X.; Guizani, M. A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing. Sensors 2019, 19, 1274. [Google Scholar] [CrossRef] [Green Version]
  8. Omar, H.A.; Lu, N.; Zhuang, W. Wireless access technologies for vehicular network safety applications. IEEE Netw. 2016, 30, 22–26. [Google Scholar] [CrossRef]
  9. Turcanu, I.; Salvo, P.; Baiocchi, A.; Cuomo, F.; Engel, T. A multi-hop broadcast wave approach for floating car data collection in vehicular networks. Veh. Commun. 2020, 24, 100232. [Google Scholar] [CrossRef] [Green Version]
  10. Wahid, A.; Yasmeen, H.; Shah, M.A.; Alam, M. Holistic approach for coupling privacy with safety in VANETs. Comput. Netw. 2019, 148, 214–230. [Google Scholar] [CrossRef]
  11. Ullah, I.; Wahid, A.; Shah, M.A.; Waheed, A. VBPC: Velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET. In Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 132–137. [Google Scholar]
  12. Amro, B. Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change. Int. J. Netw. Secur. Its Appl. 2018, 10, 11–21. [Google Scholar] [CrossRef]
  13. Guo, N.; Ma, L.; Gao, T. Independent Mix Zone for Location Privacy in Vehicular Networks. IEEE Access 2018, 6, 16842–16850. [Google Scholar] [CrossRef]
  14. Guo, N.; Ma, L.; Gao, T. A Location Privacy-Preserving Scheme for VANETs Based on Virtual Mix Zone. IEEE Internet Things J. 2017, 3, 1–8. [Google Scholar]
  15. Arain, Q.A.; Memon, I.; Deng, Z.; Memon, M.H.; Mangi, F.A.; Zubedi, A. Location monitoring approach: Multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimed. Tools Appl. 2018, 77, 5563–5607. [Google Scholar] [CrossRef]
  16. Singh, P.K.; Gowtham, S.N.; Tamilselvan, S.; Nandi, S. CPESP: Cooperative pseudonym exchange and scheme permutation to preserve location privacy in VANETs. Veh. Commun. 2019, 20, 100183. [Google Scholar] [CrossRef]
  17. Emara, K.; Woerndl, W.; Schlichter, J. CAPS: Context-aware Privacy Scheme for VANET Safety Applications. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 22–26 June 2015; pp. 21:1–21:12. [Google Scholar] [CrossRef]
  18. Khacheba, I.; Yagoubi, M.B.; Lagraa, N.; Lakas, A. CLPS: Context-based location privacy scheme for VANETs. Int. J. Hoc Ubiquitous Comput. 2018, 29, 141–159. [Google Scholar] [CrossRef]
  19. Freudiger, J.; Raya, M.; Félegyházi, M.; Papadimitratos, P.; Hubaux, J.-P. Mix-Zones for Location Privacy in Vehicular Networks. ACM Work. Wirel. Netw. Intell. Transp. Syst. 2007, 51, 1–7. [Google Scholar]
  20. Carianha, A.M.; Barreto, L.P.; Lima, G. Improving Location Privacy in Mix-Zones for VANETs. In Proceedings of the 30th IEEE International Performance Computing and Communications Conference, Orlando, FL, USA, 17–19 November 2011; pp. 1–6. [Google Scholar]
  21. Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2012, 61, 86–96. [Google Scholar] [CrossRef] [Green Version]
  22. Ying, B.; Makrakis, D.; Mouftah, H.T. Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 2013, 17, 1524–1527. [Google Scholar] [CrossRef]
  23. Ying, B.; Makrakis, D.; Hou, Z. Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans. Veh. Technol. 2015, 64, 5631–5641. [Google Scholar] [CrossRef]
  24. Wang, S.; Yao, N.; Gong, N.; Gao, Z. A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Netw. Appl. 2017. [Google Scholar] [CrossRef]
  25. Ali, Q.; Zhongliang, A.; Imran, D. Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks. Wirel. Pers. Commun. 2017, 97, 3645–3671. [Google Scholar] [CrossRef]
  26. Ali, Q.; Zhongliang, A.; Imran, D. Map Services Based on Multiple Mix-zones with Location Privacy Protection over Road Network. Wirel. Pers. Commun. 2017, 97, 2617–2632. [Google Scholar] [CrossRef]
  27. Boualouache, A.; Moussaoui, S. S2si: A practical pseudonym changing strategy for location privacy in vanets. In Proceedings of the 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria, 17–19 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 70–75. [Google Scholar]
  28. Boualouache, A.; Moussaoui, S.U. Computing, “Urban pseudonym changing strategy for location privacy in VANETs”. Int. J. Hoc Ubiquitous Comput. 2017, 24, 49–64. [Google Scholar] [CrossRef]
  29. Boualouache, A.; Moussaoui, S. TAPCS: Traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw. Appl. 2017, 10, 1008–1020. [Google Scholar] [CrossRef]
  30. Sampigethaya, K.; Huang, L.; Li, M.; Poovendran, R.; Matsuura, K.; Sezaki, K. CARAVAN: Providing Location privacy for VANET; Washington University Seattle Dept of Electrical Engineering: Seattle, WA, USA, 2015. [Google Scholar]
  31. Sampigethaya, K.; Li, M.; Huang, L.; Poovendran, R. AMOEBA: Robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 2007, 25, 1569–1589. [Google Scholar] [CrossRef] [Green Version]
  32. Buttyán, L.; Holczer, T.; Weimerskirch, A.; Whyte, W. Slow: A practical pseudonym changing scheme for location privacy in vanets. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 1–8. [Google Scholar]
  33. Wei, Y.-C.; Chen, Y.-M. Safe Distance Based Location Privacy in Vehicular Networks. In Proceedings of the 2010 IEEE 71st Vehicular Technology Conference, Taipei, Taiwan, 16–19 May 2010; pp. 1–5. [Google Scholar] [CrossRef]
  34. Amro, B.; Saygin, Y.; Levi, A. Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update. IET Intell. Transp. Syst. 2013, 7, 388–395. [Google Scholar] [CrossRef]
  35. Memon, I.; Mirza, H.T.; Arain, Q.A.; Memon, H. Multiple mix zones de-correlation trajectory privacy model for road network. Telecommun. Syst. 2019, 70, 557–582. [Google Scholar] [CrossRef]
  36. Emara, K. Location Privacy in Vehicular Networks. In Proceedings of the 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Madrid, Spain, 4–7 June 2013; pp. 6–7. [Google Scholar]
  37. Boualouache, A.; Senouci, S.M.; Moussaoui, S. Vlpz: The vehicular location privacy zone. Procedia Comput. Sci. 2016, 83, 369–376. [Google Scholar] [CrossRef] [Green Version]
  38. Chen, Y.; Lo, T.; Lee, C.; Pang, A. Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs. IEEE Commun. Lett. 2013, 937–938. [Google Scholar] [CrossRef]
  39. Memon, I.; Chen, L.; Arain, Q.A.; Memon, H.; Chen, G. Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. Int. J. Commun. Syst. 2018, 31, 1–44. [Google Scholar] [CrossRef]
  40. Qiu, Y.; Liu, Y.; Li, X.; Chen, J. A Novel Location Privacy-Preserving Approach Based on Blockchain. Sensors 2019, 20, 3519. [Google Scholar] [CrossRef]
  41. Li, T.; Ma, J.; Sun, C. SRDPV: Secure route discovery and privacy-preserving verification in MANETs. Wirel. Netw. 2019, 25, 1731–1747. [Google Scholar] [CrossRef]
  42. Cui, Y.; Gao, F.; Li, W.; Shi, Y.; Zhang, H.; Wen, Q.; Panaousis, E. Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 2020, 20, 4651. [Google Scholar] [CrossRef] [PubMed]
  43. Corser, G.; Fu, H.; Shu, T. Endpoint Protection Zone ( EPZ ): Protecting LBS User Location Privacy Against Deanonymization and Collusion in Vehicular Networks. Telecommun. Syst. 2013, 369–374. [Google Scholar] [CrossRef]
  44. Hoh, B.; Gruteser, M. Protecting location privacy through path confusion. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2015; pp. 194–205. [Google Scholar] [CrossRef] [Green Version]
  45. Corser, G.; Fu, H.; Shu, T.; D’Errico, P.; Ma, W.; Leng, S.; Zhu, Y. Privacy-by-decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. In Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, Dearborn, MI, USA, 8–11 June 2014; pp. 1030–1036. [Google Scholar]
  46. Lim, J.; Yu, H.; Kim, K.; Kim, M.; Lee, S. Preserving Location Privacy of Connected Vehicles With Highly Accurate Location Updates. Int. J. Commun. Syst. 2017, 21, 540–543. [Google Scholar] [CrossRef]
  47. Cui, J.; Wen, J.; Han, S.; Zhong, H. Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc Network. In Proceedings of the 2013 International Conference on Connected Vehicles and Expo (ICCVE), Las Vegas, NV, USA, 2–6 December 2013; pp. 1–8. [Google Scholar] [CrossRef]
  48. Emara, K. Safety-aware location privacy in VANET: Evaluation and comparison. IEEE Trans. Veh. Technol. 2017, 66, 10718–10731. [Google Scholar] [CrossRef]
  49. Boualouache, A.; Senouci, S.; Moussaoui, S. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks. IEEE Commun. Surv. Tutor. 2018, 20, 770–790. [Google Scholar] [CrossRef] [Green Version]
  50. Kanwal, T.; Jabbar, A.A.; Anjum, A.; Malik, S.U.; Khan, A.; Ahmad, N.; Balubaid, M.A. Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud. Int. J. Distrib. Sens. Netw. 2019, 15, 6. [Google Scholar] [CrossRef]
  51. Emara, K.; Woerndl, W.; Schlichter, J. Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks. arXiv 2016, arXiv:1607.07656. [Google Scholar]
  52. Bhati, B.S.; Venkataram, P. Performance Analysis of Privacy Protection System During Data Transfer in MANETs. Int. J. Wirel. Inf. Netw. 2018, 25, 30–43. [Google Scholar] [CrossRef]
  53. Hamouid, K.; Adi, K. Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Netw. Appl. 2019, 12, 1137–1155. [Google Scholar] [CrossRef]
Figure 1. Location privacy protection techniques taxonomy.
Figure 1. Location privacy protection techniques taxonomy.
Sensors 21 03077 g001
Figure 2. Basic system model.
Figure 2. Basic system model.
Sensors 21 03077 g002
Figure 3. Adversary model.
Figure 3. Adversary model.
Sensors 21 03077 g003
Figure 4. The block diagram of the proposed scheme.
Figure 4. The block diagram of the proposed scheme.
Sensors 21 03077 g004
Figure 5. Selection of GH and group communication.
Figure 5. Selection of GH and group communication.
Sensors 21 03077 g005
Figure 6. Virtual pseudonyms changing in the grouping concept.
Figure 6. Virtual pseudonyms changing in the grouping concept.
Sensors 21 03077 g006
Figure 7. Flow of pseudonym update process.
Figure 7. Flow of pseudonym update process.
Sensors 21 03077 g007
Figure 8. Virtual pseudonym update process.
Figure 8. Virtual pseudonym update process.
Sensors 21 03077 g008
Figure 9. Adversary analyzing vehicle location data.
Figure 9. Adversary analyzing vehicle location data.
Sensors 21 03077 g009
Figure 10. LBS query flow method.
Figure 10. LBS query flow method.
Sensors 21 03077 g010
Figure 11. HLPN for DGVP scheme.
Figure 11. HLPN for DGVP scheme.
Sensors 21 03077 g011
Figure 12. HLPN for adversary analysis on pseudonym-changing protocol.
Figure 12. HLPN for adversary analysis on pseudonym-changing protocol.
Sensors 21 03077 g012
Figure 13. HLPN of position-mixing algorithm.
Figure 13. HLPN of position-mixing algorithm.
Sensors 21 03077 g013
Figure 14. SUMO OpenStreet Map scenario.
Figure 14. SUMO OpenStreet Map scenario.
Sensors 21 03077 g014
Figure 15. Vehicle anonymization at various time periods.
Figure 15. Vehicle anonymization at various time periods.
Sensors 21 03077 g015
Figure 16. The anonymity of vehicles at different traffic densities.
Figure 16. The anonymity of vehicles at different traffic densities.
Sensors 21 03077 g016
Figure 17. The entropy of vehicles at different periods on the road network.
Figure 17. The entropy of vehicles at different periods on the road network.
Sensors 21 03077 g017
Figure 18. Vehicle entropy at various traffic densities.
Figure 18. Vehicle entropy at various traffic densities.
Sensors 21 03077 g018
Figure 19. Location traceability at different periods.
Figure 19. Location traceability at different periods.
Sensors 21 03077 g019
Figure 20. Location traceability at different vehicle traffic conditions.
Figure 20. Location traceability at different vehicle traffic conditions.
Sensors 21 03077 g020
Figure 21. Vehicles successful pseudonym-changing at different time.
Figure 21. Vehicles successful pseudonym-changing at different time.
Sensors 21 03077 g021
Figure 22. Vehicle position exchanged at different groups.
Figure 22. Vehicle position exchanged at different groups.
Sensors 21 03077 g022
Figure 23. Adversary confusion or ASS with different time spots.
Figure 23. Adversary confusion or ASS with different time spots.
Sensors 21 03077 g023
Figure 24. Rate of adversary confusion at various tracking time.
Figure 24. Rate of adversary confusion at various tracking time.
Sensors 21 03077 g024
Figure 25. Adversary confusion in identifying vehicles on the road.
Figure 25. Adversary confusion in identifying vehicles on the road.
Sensors 21 03077 g025
Figure 26. Computation Latency (MS) at different vehicle traffic density.
Figure 26. Computation Latency (MS) at different vehicle traffic density.
Sensors 21 03077 g026
Figure 27. Communication latency at a different number of vehicles.
Figure 27. Communication latency at a different number of vehicles.
Sensors 21 03077 g027
Table 2. Symbols used in HLPN for DGVP scheme.
Table 2. Symbols used in HLPN for DGVP scheme.
SymbolDescription
DistCalculationCalculation of distance between vehicles
Discard-RequestDiscard-request of a Vehicle with invalid credentials
GHGroup Head
Issue-CertIssuance certificate to vehicles
LPNLicense Plate Number
NFNeighbor Function
NotifyNotification in the group for pseudonym change
NTNeighbor Threshold
OBUOn-Board Unit
PExpiryVehicle Pseudonym expiration
PupdatePseudonym update process
PseudoValidityThe validity of Pseudonym for some time
RCReady for pseudonym change
Reg-RequestRequest for vehicle registration to TA
Req-CertificateVehicle request for certification
ValidCertValid certificate
VPCThe virtual pseudonym change process
VRDVehicle registration data
TATrusted Authority
Table 3. Places used in HLPN for DGVP scheme.
Table 3. Places used in HLPN for DGVP scheme.
SymbolDescription
φ (Reg-Request) P ( V I D × L P N )
φ (TA) P ( V I D × L P N × P U i , k × P R i , k )
φ (VRD) P ( V I D × L P N × V c r e d e n t i a l s )
φ (OBU) P ( V I D × P I D × P U i , k × P × C e r t E x p i r e )
φ (Discard-Request) P ( V I D × L P N × I n v a l i d C r e d e n t i a l s )
φ (Req-Certificate) P ( V I D × L P N × E x p i r e C e r t × R e q u i r e C e r t )
φ (PExpiry) P ( P I D × P T L i m i t × F l a g × C e r t i f i c a t e )
φ (GH) P ( P I D × G I D × L O C × F l a g )
φ (Grouping) P ( P I D × V L R × T x × C e r t i f i c a t e )
φ (ValidCert) P ( P I D × V L R × T x × V a l i d C r e d e n t i a l s )
φ (JoinGroup) P ( P I D × G I D × V L R × T x )
φ (NF) P ( P I D × G I D × V L R × T x × D i s t × C o u n t )
φ (NT) P ( P I D × G I D × C o u n t × T h r e s h )
φ (RC) P ( P I D × G I D × T h r e s h × I n d i c a t o r )
φ (Notify) P ( P I D × G I D × I n d i c a t o r × A l e r t P C )
φ (PUpdate) P ( P I D × G I D × I n d i c a t o r S × C P × F l a g )
φ (VPC) P ( P I D × G I D × T x × S e l e c t N e i g h )
φ (DistCalculation) P ( P I D × G I D × D i s t ( V i × V j ) )
φ (Virtualizer) P ( P I D × G I D × M i n D i s t )
φ (MessagesCreation) P ( P I D × G I D × M S G 1 × M S G 2 )
φ (Pseudo-Update) P ( P I D × G I D × C P × F l a g )
φ (PsuedoValidity) P ( P I D × T x × F l a g × T L i m i t )
Table 4. Symbols used in HLPN for attacker scenario in DGVP scheme.
Table 4. Symbols used in HLPN for attacker scenario in DGVP scheme.
SymbolDescription
BCaptureCapturing of beacon messages
CPChange pseudonym
IdentificationIdentification of a vehicle by an adversary
NTNeighbor threshold
NeighAlertAlert neighbors for the pseudonym change process
N P I D New pseudo-identity
OldPseudoOld pseudonyms of a vehicle
PCCPseudonym change collectively
PCPseudonym change
Pseudo-IDsVehicle pseudo-identities
ReadyNeighNeighbor vehicles ready for pseudonym change
TSTimestamp
TxNeighTransmission range neighbors
VDVehicle data
VirtualPCVirtual pseudonyms change process
Table 5. Places used in HLPN for attacker scenario in DGVP scheme.
Table 5. Places used in HLPN for attacker scenario in DGVP scheme.
SymbolDescription
φ (NT) P ( P I D × G I D × C o u n t × T h r e s h )
φ (PC) P ( P I D × G I D × T h r e s h × C P C )
φ (GH) P ( P I D × G I D × L O C × F l a g )
φ (NeighAlert) P ( P I D × G I D × I n d i c a t o r × A l e r t P C × F l a g )
φ (Pseudo-Update) P ( P I D × G I D × P C C × F l a g )
φ (TxNeigh) P ( P I D × G I D × T x × N S × D i s t ( V i × V j ) )
φ (Pseudo-IDs) P ( P I D × G I D × M S G 1 × M S G 2 )
φ (Updation) P ( P I D × G I D × S k i p V P × C P × F l a g )
φ (Beacons) P ( N P I D × G I D × L O C × S × D )
φ (VD) P ( N P I D × G I D × c o l l e c t ( P I D , L O C ) )
φ (Identification) P ( N P I D × G I D × O l d P I D × O l d T r a c e s × C L O C )
φ (OldPseudo) P ( O l d P I D × L O C × T S )
Table 6. Symbols used in HLPN for position-mixing method.
Table 6. Symbols used in HLPN for position-mixing method.
SymbolDescription
CalDistDistance calculation with neighbor vehicles
IDMatchingLinking of vehicle identities used for various timestamp
LMLocation mixer
LOCMsgVehicle location messages
LOCMatchingMatching visited locations of a vehicle
LSLocation Server
MaxDistMaximum distance range with a T x neighbor
NeighSelectionSelection of neighbor vehicle as a position mixer
NFNeighbor Function
OutRangeThe vehicle that gets out of the transmission range
RandSelectRandom selection of neighbor vehicle
SameDist T x vehicle are in the same distance range
SelectMaxSelect a neighbor with a maximum distance range
SendQSending of query to LS for location finding
TakePOSTaking of position coordinates
VLDVehicle location data
VIdentityVehicle identity
Table 7. Places used in HLPN for position-mixing method.
Table 7. Places used in HLPN for position-mixing method.
SymbolDescription
φ (NF) P ( G I D × T x × V L R × D )
φ (CalDist) P ( G I D × T x × D i s t ( V i , V j ) )
φ (OutRange) P ( G I D × T x × V L R × N o t i n R a n g e )
φ (NeighSelection) P ( G I D × T x × V L R × S a m e D i s t × M a x D i s t )
φ (GH) P ( G I D × P I D × V e r i f y )
φ (LM) P ( G I D × P I D × T x × M a x D i s t × M i x e r j )
φ (Positions) P ( G I D × P I D × T x × S a m e D i s t × R a n d M i x e r )
φ (MsgExchange) P ( G I D × T x × P O S i × P O S j )
φ (LS) P ( G I D × V L × M i x L O C × R e q L O C )
φ (Vehicle) P ( G I D × P I D × I n t e r e s t L O C )
φ (LOCMsg) P ( G I D × P I D × V L × D × L O C i )
φ (OldPseudo) P ( G I D × O l d P I D × L O C × T S )
φ (VIdentify) P ( G I D × P I D × V L × D × L O C i × E x p o s e )
Table 8. Simulation parameters for DGVP.
Table 8. Simulation parameters for DGVP.
ParametersValues
SimulatorvNS2, SUMO
MapOpenStreetMap
Road area2522 × 2323 m
Speed Range0–20 m/s
Simulation Time300 s
Beacon Interval300 millisecond
Bit rate6 Mbps
Number of vehicles150
Transmission range300 m
Neighbor Radius100 m
Radius of the group300 m
Group life100 s
Routing protocolAODV
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ullah, I.; Shah, M.A.; Khan, A.; Maple, C.; Waheed, A. Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors 2021, 21, 3077. https://doi.org/10.3390/s21093077

AMA Style

Ullah I, Shah MA, Khan A, Maple C, Waheed A. Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors. 2021; 21(9):3077. https://doi.org/10.3390/s21093077

Chicago/Turabian Style

Ullah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple, and Abdul Waheed. 2021. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs" Sensors 21, no. 9: 3077. https://doi.org/10.3390/s21093077

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop