Next Article in Journal
Spatial-Variant SAR Range Cell Migration Correction Using Subaperture Strategy
Next Article in Special Issue
Physical Unclonable Function Based on the Internal State Transitions of a Fibonacci Ring Oscillator
Previous Article in Journal
From Microorganism-Based Amperometric Biosensors towards Microbial Fuel Cells
Previous Article in Special Issue
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles

by
Messaoud Babaghayou
1,*,
Nabila Labraoui
1,
Ado Adamou Abba Ari
2,3,
Mohamed Amine Ferrag
4,
Leandros Maglaras
5,* and
Helge Janicke
6
1
STIC Lab, University of Abou Bekr Belkaid, Chetouane Tlemcen 13000, Algeria
2
DAVID Lab, Faculty of Sciences, University of Versailles Saint-Quentin-en-Yvelines, 45 Avenue des États-Unis, CEDEX, 78035 Versailles, France
3
LaRI Lab, University of Maroua, Maroua P.O. Box 814, Cameroon
4
Department of Computer Science, Guelma University, Guelma 24000, Algeria
5
School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK
6
Cyber Security Cooperative Research Centre (CSCRC), Perth 6027, Australia
*
Authors to whom correspondence should be addressed.
Submission received: 9 March 2021 / Revised: 26 March 2021 / Accepted: 27 March 2021 / Published: 1 April 2021
(This article belongs to the Special Issue Cyber Security in IoT Era)

Abstract

:
Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various privacy-preserving schemes have been designed and evaluated, for example, mix-zone, encryption, group forming, and silent-period-based techniques. However, they all suffer inherent limitations. In this paper, we review these limitations and propose WHISPER, a safety-aware location privacy-preserving scheme that adjusts the transmission range of vehicles in order to prevent continuous location monitoring. We detail the set of protocols used by WHISPER, then we compare it against other privacy-preserving schemes. The results show that WHISPER outperformed the other schemes by providing better location privacy levels while still fulfilling road-safety requirements.

1. Introduction

A Vehicular Ad-hoc Network (VANET) with its variety of protocols (e.g., IEEE 802.11P, IEEE 1609) [1] and communication types like Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) [2] has served as a basis for the promising Internet of Vehicles (IoV) paradigm [3,4,5]. IoV benefits from VANET to extend the usability range by allowing non-conventional communications and applications, e.g., Vehicle to Everything (V2X) communications, to emerge. IoV is an important sub-domain of IoT as well as a clear example of System of Systems domain [6]. Figure 1 shows V2X external communications and internal equipments. A vehicle using V2X can enhance road-safety by broadcasting a Basic Safety Message (BSM) [7,8] beacon message with a 300-m range and a frequency of 1 to 10 BSMs per second from its OBU [9,10,11]. The data included in BSMs are illustrated in Figure 2. This allows receiving vehicles to be aware of the potential dangers posed by nearby vehicles in addition to managing road-congestion, which is considered a high-level challenge [5] through the network of Road-Side-Units (RSUs).
Since BSMs contain fine-grained location data, even though they are useful for road safety, they do open privacy-related issues: Any entity with eavesdropping capability can monitor the whereabouts of IoV users. Smart cars’ safety and infotainment applications may also reveal user private information. Using these data, a system that is ultimately designed to offer safety and comfort applications to drivers can be abused by third parties, such as employers, insurance companies, or criminal organizations to track individuals [12]. The introduction of mechanisms that can preserve location privacy has become a new research trend that has attracted widespread attention among researchers. Most existing location privacy schemes, e.g., mix-zone, synchronized schemes, etc., are ineffective in achieving a high-level of privacy because of the very precise locations included in BSMs and because of their resource and overhead-consuming characteristics. The better candidate mechanism used is that of the silent period schemes by ceasing BSMs broadcasting until emerging from another location with a new pseudo-identifier. However, the major drawback of such a technique is the sacrifice of safety for the sake of privacy [13].
As safety is a substantial requirement underpinning the introduction of V2X communication, silent period schemes have been received with reservations by the research community. Our motivation is to find a solution to allow nearby vehicles to be aware (providing safety) and reduce an adversary opportunity to employ eavesdropping attacks. The purpose of protecting user location privacy in an IoV context is related to the risk of user private information being disclosed. Location privacy is directly connected to other types of privacy. Location privacy leaks can reveal the home and work address of the driver, some visits to sensitive places, travel habits, times of absence from home, etc. The correlation of this spatio-temporal information with other data allows an adversary to come to conclusions about health habits, social contacts, religious beliefs, etc. Protecting user location privacy has many benefits both to the users and the system. First of all privacy preservation improves the performance of the IoV system and reduces users’ concerns about security and privacy. Thus IoVs can attract more users to use their functions and applications, especially those that are related to safety, promoting further innovation and development in the automobile industry. In this paper, we propose a mechanism that reduces the transmission range occasionally to just inform nearby vehicles and prevent the adversary from tracking users through BSMs. The design of a pseudonym change scheme that exploits such a transmission range adjustment feature is inspired by our previous work [9] where we studied the effect of changing the transmission range using existing strategies. The novel method that is proposed in the current article, entitled “WHISPER”, maintains road-safety since vehicles are only hidden from the tracker (occasionally) and not from close vehicles (always), which makes the use of WHISPER an advantageous feature that comes in favor of safety and privacy.
The main contributions of this paper are as follows:
-
We propose a novel location privacy-preserving scheme, entitled WHISPER, that maintains privacy without sacrificing safety;
-
We detail the techniques and protocols used by WHISPER for adjusting the transmission range and performing a pseudonym change;
-
We compare WHISPER to well-known location privacy-preserving schemes such as cooperative pseudonym change (CPN) [14], Random Silent Period (RSP) [15], and SLOW [16] in a manhattan-grid model with various densities using location privacy and QoS as metrics in addition to a comparative table.
The remainder of this paper is organized as follows: In Section 2, we review and discuss existing techniques to address the problem of location privacy in V2X. Then, we give our proposed system model in Section 3. Next, the proposed WHISPER scheme with its techniques and protocols are presented in Section 4. After that, WHISPER performances are analyzed in Section 5. Later in Section 6, we discuss the schemes in the obtained results perspective. Finally, Section 7 concludes the paper and gives future work.

2. Related Work

The location privacy problem is being considered as one of the crucial parameters for the adoption of a successful IoV system. There are a number of efficient privacy preservation techniques for location based ervices (LBS), however, they are using location obfuscating [17], hiding, anonymizing, and making dummies. These techniques are explained in [18], however, they are not recommended in the context of achieving safety via BSMs broadcasting and this is because of the safety-related requirements that do not recommend risking drivers’ safety for the sake of privacy as using such techniques implies tricking the adversary alongside the nearby vehicles.
Beresford and Stajano (2003) [19] introduce the mix-group concept, defined as a group region where vehicles are mixed within that region. However, broadcast beacons that contain high precision locations still represent a problem for drivers’ privacy. Based on the mix-group concept, Freudiger et al. (2007) proposed CMIX [20], a location privacy scheme that uses symmetric key-based cryptography to ensure that beacons are not readable by the adversary. This approach uses a key shared by RSUs to encrypt BSMs. Their approach did not consider the internal attacker scenario in addition to heavy infrastructure reliance.
The silent period, a concept that was firstly introduced in the field of wireless LANs by Huang et al. (2005) [15], ceases any BSM broadcasts for a specific period of time in order to achieve a good level of privacy. The strategy works well against correlation attacks [21]. However the silent periods introduce a reduction in safety relevant data being shared within the IoV – reducing the safety properties of the system and potentially invalidating safety requirements of (“ETSI TR 103 415” [22] and “ETSI TS 103 601” [23] standards). This safety-privacy trade-off is addressed in our work on WHISPER.
Buttyán et al. (2009) proposed the SLOW strategy [16]. SLOW aims at letting vehicles choose the best moment to update their pseudonyms. This decision is based on a threshold of the vehicles speed, assuming that for low speeds the risk of crashes will be low and the vehicle is allowed to stay silent for a period of time. SLOW, does not necessarily respect the beaconing frequency of once per second at minimum [9] and this occurs in congested areas. Eckhoff et al. (2011) proposed Slotswap [24], a strategy that uses a time-slotted pool to manage pseudonyms by each vehicle. Each slot is used for a period of time with the possibility to re-use pseudonyms after reaching the last time-slot. The exchange of pseudonyms between time-slots of different vehicles is also an option of their approach.
Lu et al. (2012) leveraged the feature of social spots [25] for privacy enhancement. Social spots are places where vehicles meet more frequently and are characterized with high densities such as intersections and parking lots. An adversary will be more confused in such dense areas because the probability to successfully match the old changed pseudonym with the new one inside a set of vehicles n will be tied inversely with the size of n. In the same social context, Babaghayou et al. (2019) proposed the Extreme Points Privacy (EPP) [18] scheme. EPP exploits the feature that IoV users are generally situated in district (where they live) and since turning the vehicle’s engine results in beaconing, this gives an indication to the adversary that the user is about to leave their home, thus, the authors propose to cease beaconing until leaving the district. The probability of leaving a district under different scenarios are evaluated.
Tomandl et al. (2012) [26] investigated the effects of both mix-zones and silent periods. The work was also implemented by Emmara et al. (2016) in their privacy extension PREXT [27] under the name of Coordinated Silent Period (CSP). Emmara et al. (2015) also proposed their own privacy scheme: Context-Aware Privacy Scheme (CAPS) [28]. CAPS lets vehicles choose the best opportunity to enter a silence period and to change their pseudonyms.
Pan and Li (2013) proposed the Cooperative Pseudonym Change (CPN) [14] scheme that exploits the best opportunity to achieve a synchronous pseudonym change with the help of neighbors. This way, the adversary loses tracking since vehicles are considered as the target and are indistinguishable. Yet, vehicles are not fully indistinguishable due to the fact that they broadcast fine-grained location. This means that an attacker is still able to identify the vehicles based on their precise location.
Emmara et al. (2016) also apply the silent period mechanism [15] to propose the Random Silent Period (RSP) scheme [27]. RSP is based on entering silence for a random range of time, then, it performs the pseudonym change. The scheme’s nature is considered as a spatial mix-zone because when vehicles enter the silence period and leave it after some time this implies disappearing from a point and emerging from another point which is the same idea with spatial mix-zones.
Another scheme was proposed by Zidani et al. (2018) [29] which is the Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach (ENeP-AB) strategy that uses the number of neighbors and the predicted positions d as a pseudonym change trigger. Zidani et al. had also compared ENeP-AB to some other strategies like CAPs and the mix-context enhanced.
The effect of pseudonym change is mostly beneficial to privacy, however, Schoch et al. (2006) [30] shed light on some adverse consequences of intense pseudonym changes on the overall network performances and geo-routing protocols. Their results show that high pseudonym change frequencies negatively affect the system performances. Following a different direction, Zhang et al. (2019) [7] had touched upon the problem of collisions that occur while sending BSMs with high frequency, more precisely the problems occurring on the Medium Access Control (MAC) layer. They demonstrated the issue and proposed a hybrid MAC Protocol and showed its effectiveness via analysis and simulation means.
Goudarzi and Asgari (2018) proposed a congestion control mechanisms algorithm called (NOPC) [31] that is based on the beacon transmission power control. The scheme performs well in the bandwidth usage and fairness, nevertheless, its influence was not evaluated versus the achieved location privacy. In the same area, SAB Mussa et al. (2014) [32] shed light on the challenging issues that have to be addressed in the beaconing and transmission range control in the vehicular domain but without mentioning the privacy requirement [33]. A summary of recent location privacy-preserving schemes for the Internet of Vehicles is presented in Table 1. In the same table the major advantages and drawbacks of all these methods are also presented.
Based on the methods that were analyzed in the previous paragraphs and the ones presented in Table 1, it is obvious that the reviewed schemes have serious limitations. The silent period schemes are the most promising solutions but at the cost of road-safety which does not make them welcomed by the research community. Moreover, pseudonym schemes on the other hand cannot reassure privacy preservation since an adversary can still track vehicles that are broadcasting their locations even if they change pseudonyms by performing the so-called linking attack. The proposed idea in this research paper (WHISPER) comes to fill these limitations, by ensuring privacy along with a high road-safety level, by acting as a silent period scheme on some occasions.

3. System Model

In this section, we define and describe the Overall System Model comprised of a network model, the threat/attacker model, a set of assumptions that are taken while making such a research study in addition to technical details and a mathematical model that reflects the fundamentals of using certificates under an IoV system.

3.1. Network Model

The network model used in this paper is illustrated in Figure 3, and contains the following entities:
  • Vehicles: They are the basic units of the VANET paradigm which provides a platform to the V2X applications. The communication is done via the 802.11p [3] standard and can perform Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. The set of vehicles is defined as V = { v 1 , v 2 , v n } .
  • System Authorities: They are the the entities related to the law-side (e.g., governmental bodies) that have different resources, tasks, and roles like: Distributing, issuing, revoking pseudonyms, etc. [41]. It is also important that the system authorities almost always are able to fulfill the accountability requirement in order to track down and determine misbehaving users [42].
  • Infrastructure: Composed by different components and stations, its role is to relay and facilitate the connectivity between the vehicles and any potential attached network entity. The most interesting feature is the Vehicle to Infrastructure (V2I) communications. Additionally, V2X communications may exploit the infrastructure.

3.2. Threat Model

The threat model is shown in Figure 4 and is composed from the following elements:
  • Tracker: The malicious element in the system, even though it is not active, can still execute many influencing attacks such as eavesdropping, tracking, profile-generation, etc. In most researches, the Global Passive Adversary (GPA) [10] is considered as the adversary type used while evaluating their own schemes. The GPA is a strong adversary that covers almost the whole map (or at least, the region of interest) and can obtain every sent message passively, i.e., no data forgery, modification, or creation is executed by him.
  • Eavesdropping stations: They are stations capable of collecting the transmitted BSMs where all of the coverage mode, the emplacement, and the transmission range of vehicles do affect the amount of the collected packets.
  • Tracker resources: They are the various materials and software used in conjunction with the eavesdropping stations. They can be high performance servers, tracking algorithms and methods, etc.

3.3. Assumptions

We put a set of assumptions for what is included in this research:
-
Vehicles are able to adjust their transmission range by changing the used transmission power.
-
The adversary is setting eavesdropping stations in accordance to the standardization (300 m of transmission range for vehicles).
-
The distributed eavesdropping stations do overlap in 30 m and have a moderate coverage mode to collect much BSMs by effectively exploiting the resources. This is illustrated in Figure 5.
-
At a given time, the adversary can exclude the remaining of the map and only focuses on a region of interest. This is done at the aim of targeting only specific vehicles for better calculations and to well-exploit the resources (it is shown in Figure 5).
-
Vehicles use Public Key Infrastructure (PKI) certificates mechanism to communicate, thus, changing the used pseudonym implies using a new certificate. This later is assumed to be issued from a trusted authority by doing the certificates refill request.

3.4. Certificates Management

Since the use of pseudonyms implies the use of certificates, a better management is envisioned in order not to affect the functioning of the whole system. With this said, having a large set of certificates with less consumption frequency would be preferred, hence minimizing their refill requests. In order to quantify the used certificates for each vehicle per unit of time, an estimation is highly needed. For that aim, we provide the following equations related to the used certificates:
-
The estimated number of certificates per day N b r C e r t s d a y without changing the certificate by a number other than that of the expiration is calculated as in Equation (1):
N b r C e r t s _ d a y = N b r C e r t s _ m × D r i v T i m e _ d a y
where N b r C e r t s _ m is the number of used certificate per minute and D r i v T i m e _ d a y is the estimated amount of time (in minutes) that the user is going to drive per day.
-
The number of necessary certificates per year, assuming that a normal refill is made each year, is like in Equation (2):
N b r C e r t s _ y e a r = N b r C e r t s _ d a y × 365 .
-
From here, the estimated remaining certificates after d days since the last yearly refill ( N b r R e m a i n C e r t s ( d ) ) is calculated as written in Equation (3):
N b r R e m a i n C e r t s ( d ) = N b r C e r t s _ y e a r d × N b r C e r t s _ d a y .
-
However, certificates may also get invalid due to a certificate change (triggered by a pseudonym change for example) and thus, the exact remaining certificates after d days since the last yearly refill ( R e a l N b r R e m a i n C e r t s ( d ) ) can be calculated as in Equation (4):
R e a l N b r R e m a i n C e r t s ( d ) = N b r C e r t s _ y e a r d × N b r C e r t s _ d a y N b r C e r t s _ c h n g d
where N b r C e r t s _ c h n g d is the number of times the certificate got changed due to a reason other than a normal expiration.

4. The Proposed WHISPER Strategy

WHISPER uses the change of transmission power to preserve or at least augment the level of location privacy in addition to ensuring road-safety while driving. Vehicles monitor the neighborhood and their proper speeds on-the-fly in order to adjust their beacons transmission range. This is because the adversary, in our assumptions, distributes eavesdropping stations intelligently and economically according to the standardization (that vehicles transmit with 300 m of range). Thus, when driving in low speeds the vehicle (i.g., v i ) may reduce, according to the value of its speed (and the surrounding vehicles’ speeds), its own range to ensure that:
  • The safety of its neighbor vehicle(s) (e.g., v j ) is preserved unlike the case of the silent period schemes that do not make much safety-considerations when going to enter silent. This is fulfilled by continuously checking its own speed. Thus, when in high speeds, the risk of a sudden crash will be high, which is why v i ought to be visible earlier to the surrounding vehicles ( v j ).
  • Its own safety. This is fulfilled by the neighbor vehicle(s) v j that are using the same behavior as v i while driving in different speeds. They aim, as a consequence, to inform v i earlier when they are driving in high speeds. Once it has received a BSM with a powerful transmission range, v i takes that as a parameter and adjusts, in its role, its own transmission range based on that parameter and on its own speed. By doing so, v i will be visible to the other neighbors, v j as well.
  • The two aforementioned points lead to a collective awareness that will ensure the safety of both v i and its neighbor v j .
  • To benefit and exploit the already deployed eavesdropping mode, as these eavesdropping stations will not be able to collect BSMs all the time even if the vehicles are inside the area of the eavesdropping station. This is because each eavesdropping station is placed at the aim of intercepting every sent BSM in the range of 300 m.

4.1. System Initialization

Each vehicle v i is equipped with M certificates and each one of them is defined as ( C e r t i , j ) where j represents the i-th certificate of v i . Thus, each vehicle v i has a set of certificates C i defined as follows: C i = { C e r t i , 1 , C e r t i , 2 , C e r t i , m } . When referring to a pseudonym change, this implies the use of another certificate.
Before we dive into the detailed modus-operandi of WHISPER, we define the set of concepts (find them in Table 2) that are key-parameters used to determine the exact behavior of WHISPER.
Generally speaking, in WHISPER, every vehicle v i can be in one of the following main states:
  • Vehicle ON: Is the state when a vehicle is turned on (to be ready for driving).
  • Listening: Once on, v i keeps monitoring the transmission medium to detect any transmitted BSM. Both its neighbor(s) status (found in their transmitted BSMs) and its own speed.
  • Receiving BSMs: When receiving a BSM from v j , v i proceeds into diverse calculations at the aim of knowing the status of v j .
  • Adjusting the transmission power: In this status, v i takes as parameters its own speed and the neighbors’ speed and may, accordingly, adjust its transmission range in order to ensure road-safety and preserve location-privacy of the present vehicles.
  • Checking pseudonym change condition: This status comes after the B e a c o n _ I n t e r v a l _ T i m e expires. v i will check its eligibility for a pseudonym (and certificate) change. When favorable, v i moves into the next status.
  • Pseudonym change: In this status, a pseudonym change takes place and the BSM will be sent right after.
  • Sending a BSM: This status happens after the Pseudonym change action. Sometimes, the pseudonym change trigger will not be satisfied, thus, v i just sends the BSM. In both scenarios, v i returns to the next status (Listening) afterwards.
  • Vehicle OFF: The status where a vehicle is turned off and thus the ending status.
A state diagram is presented in Figure 6 which gives a better illustration and understanding on the aforementioned states and the existing transitions.

4.2. Receiving Beacon Messages Protocol

Vehicles are always ready to receive BSMs. When receiving a BSM, the receiving vehicle v i considers the sender’s position and calculates the distance between itself and the sender. By doing this simple calculation, v i will be able to get a set of useful information that will determine its behavior. The pseudo-code of receiving a beacon message in WHISPER is illustrated in Algorithm 1. The main conclusions that v i is going to have after parsing the BSM sent by v j are the following:
  • Knowing the distance between itself and v j .
  • Whether to consider v j ’s BSM for transmission power adjustment or just ignore it.
  • It considers v j ’s BSM for transmission power adjustment if D i s t is less than or equal to G e n e r a l N R (shown in the scenario that is illustrated in Figure 7).
  • It considers v j ’s BSM for transmission power adjustment if D i s t is less than or equal to R o a d N R but also share the same road segment with each other (shown in the scenario that is illustrated in Figure 8).
  • It considers itself eligible for the pseudonym change if D i s t is less than or equal to C l o s e N R . It does change C l o s e to T r u e as a consequence.
This protocol is called whenever v i receives a BSM generated by v j and with each call, less than 10 instructions are executed thus a linear complexity per each call O ( 10 ) . With this said, by receiving ( R ) BSM, the complexity of the whole protocol will be as in Equation (5):
O ( R × 10 ) = O ( n ) .
This indicates that the R e c e i v i n g B e a c o n M e s s a g e s protocol is neither time nor resources consumer.
Algorithm 1 Receiving Beacon
1:
procedureReceiving_Beacon(beacon* bsm)
2:
     H i s _ P o s B S M . S e n d e r P o s ( ) ;
3:
     D i s t C a l c _ D i s t ( M y _ P o s , H i s _ p o s ) ;
4:
    if ( ( D i s t < = G e n e r a l N R ) OR ( ( D i s t < = R o a d N R ) AND ( M y R o a d I D = H i s R o a d I D ) ) then
5:
         H i s _ S p e e d B S M . S e n d e r S p e e d ( ) ;
6:
         S p e e d M a x ( M y _ S p e e d , H i s _ S p e e d ) ;
7:
        if ( D i s t < = C l o s e N R ) then
8:
            C l o s e T R U E ;
9:
        end if
10:
    end if
11:
    Process_Beacon(BSM);
12:
end procedure

4.3. Transmission Range Adjustment Protocol

Each vehicle v i , and after the B e a c o n _ I n t e r v a l _ T i m e expires, will send a BSM to inform the nearby vehicles about its location. Particularly, WHISPER adjusts the transmission range prior to the final BSM broadcast. The adjustment is done each time a BSM is received by v i as explained before. When going to broadcast, v i uses the value of S p e e d to decide the appropriate transmission range (between all of the four levels: Low, Medium, beyond-Medium, and High). Algorithm 2 shows the pseudo-code of sending a BSM after making the transmission range adjustment step. Additionally, S p e e d is reinitialized to 0 after that and C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) is called during this protocol and that is to see the eligibility of changing v i ’s pseudonym (and certificate respectively). Moreover, C o u n t e r is decreased depending on the value of S p e e d and this is to trigger the pseudonym change (will be seen in the next point). However, if S p e e d is at max level, there will be no meaning for changing the pseudonym and that is because the attacker is able to collect every sent beacon (the maximum transmission range is used) and that is why C o u n t e r is reinitialized to its default value D e f _ V a l .
This protocol is called whenever v i B e a c o n _ I n t e r v a l _ T i m e expires and thus, one time per call. However, it calls, in its role, the C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) protocol. In total, there are 7 instructions without counting the called protocol ( O ( 7 ) ). With this said, the complexity of the T r a n s m i s s i o n R a n g e A d j u s t m e n t protocol is defined as in Equation (6):
O ( 1 × ( 7 + O ( C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) ) ) ) = O ( C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) ) .
This indicates that the T r a n s m i s s i o n R a n g e A d j u s t m e n t protocol does depend on the P s e u d o n y m C h a n g e T r i g g e r protocol.
Algorithm 2 Sending Beacon
1:
procedureSending_Beacon
2:
    while ( O B U _ I s _ O n ) do
3:
         W a i t ( B e a c o n _ I n t e r v a l _ T i m e ) ;
4:
        Prepare_Beacon(BSM);
5:
         S p e e d M a x ( M y _ S p e e d , S p e e d ) ;
6:
        if ( S p e e d < 18 ) then
7:
            n i c . m a c 80211 p . t x P o w e r 0.2 ;
8:
            C o u n t e r C o u n t e r 5 ;
9:
        else if ( S p e e d < 36 ) then
10:
            n i c . m a c 80211 p . t x P o w e r 0.8 ;
11:
            C o u n t e r C o u n t e r 10 ;
12:
        else if ( S p e e d < 54 ) then
13:
            n i c . m a c 80211 p . t x P o w e r 3.1 ;
14:
        else
15:
            n i c . m a c 80211 p . t x P o w e r 7 ;
16:
            C o u n t e r D e f _ V a l ;
17:
        end if
18:
         S p e e d 0 ;
19:
        Checking_Pseudonym_Change_Trigger();
20:
        Send_Beacon(BSM);
21:
    end while
22:
end procedure

4.4. Pseudonym Change Trigger Protocol

In order to avoid wasting pseudonyms (certificates) in an inappropriate opportunity, finding an almost good opportunity requires that the pseudonym change trigger must be implemented delicately. Algorithm 3 shows, in a pseudo-code, the way vehicles perform a check to see the eligibility for changing their pseudonyms. When the trigger Counter reaches or drops below (0) (which is an indicator that v i was sending BSMs with a short range for some important period of time) v i changes its pseudonym then initializes the trigger Counter. This whole process provides high confusion chances since the pseudonym change is performed not in the favor of the tracker (see the scenario illustrated in Figure 9). The P s e u d o n y m C h a n g e T r i g g e r protocol is used each time the T r a n s m i s s i o n R a n g e A d j u s t m e n t is executed. Its complexity depends on a small and fixed number of instructions (5), thus, can be defined as in Equation (7):
O ( 5 ) = O ( 1 ) .
The P s e u d o n y m C h a n g e T r i g g e r protocol has O ( 1 ) as a complexity.
Algorithm 3 Checking Pseudonym Change Trigger
1:
procedureChecking_Pseudonym_Change_Trigger
2:
    if ( ( C o u n t e r < = ( D e f _ V a l / 2 ) ) AND ( C l o s e ) ) then
3:
         C o u n t e r D e f _ V a l ;
4:
        Pseudonym_Change();
5:
    else if ( C o u n t e r < = 0 ) then
6:
         C o u n t e r D e f _ V a l ;
7:
        Pseudonym_Change();
8:
    end if
9:
     C l o s e F A L S E ;
10:
end procedure

5. Performance Evaluation

To validate the performances of WHISPER, we use simulation runs in a manhattan grid model created using the NETEDIT script included in SUMO; the mobility simulator [43]. SUMO is considered as one of the most credible and realistic mobility simulators. The mobility and environment information used for the simulation are presented in Table 3. The manhattan grid model consists of 9 intersected roads with attached segments where each segment has a length of 200 m.
Concerning the network simulator, we use OMNeT++ [44]; the component is c++ based and discrete events simulator. OMNet++ allows the integration of diverse frameworks depending on the simulation nature like Veins [45], which is the vehicular network simulator. Veins acts as a bridge between the mobility simulator SUMO and the network simulator OMNet++. We also employ the PREXT extension [27] that is developed by Emmara et al.; a Veins extension that integrates a set of (1) location privacy schemes, (2) some privacy metrics such as the traceability and the normalized traceability (described in [46]), and (3) a Quality of Service (QoS) metric (the consumption of pseudonyms/certificates). A block diagram is elaborated in order to facilitate the comprehension of the interaction between the different simulation tools (shown in Figure 10). Based on PREXT, WHISPER is evaluated and compared against some other schemes under the same environmental condition using the aforementioned metrics. The schemes’ parameters and the evaluation metrics are also presented in Table 3.

5.1. The Adversary’s Achieved Traceability

Traceability, the location privacy metric used in this study, is defined as the correctness of an adversary to build the target vehicle’s traces using its eavesdropped beacons [46]. The results, provided in Figure 11 show that WHISPER outperformed SLOW, RSP, and CPN in the traceability metric with a clear difference (ranging in the interval of 10 % to 20 % ). An important remark is that at dense situations (e.g., with the density of 200 vehicle), the traceability gets augmented a bit. The reason behind the decrease in the privacy level is due to the higher density of vehicles, which can help the attacked collect BSMs from the legitimate cars.
In general, as presented in Figure 11, WHISPER performs better in terms of the level of privacy that it offered since it achieves a traceability ranging in the interval of 10 % to 20 % . We interpret this as being WHISPER reducing the vehicle’s transmission range according to its and/or the neighbor vehicles’ speeds (according to the safety situation) followed by CPN, RSP, then SLOW, in addition we observe that the traceability decreases when augmenting the number of vehicles in SLOW. The reason is that, in high densities, vehicles would drive with lower speeds, thus, SLOW performs better.

5.2. The Adversary’s Achieved Normalized Traceability

As some vehicles may not perform the pseudonym change, building their traces becomes easy, thus, excluding them gives more fairness to the real level of privacy [46]; that is the normalized traceability. With this definition, our conducted simulation under the normalized traceability aims to give a more credible and better privacy-reflecting metric to quantify the achieved privacy level of WHISPER, SLOW, RSP, and CPN (shown in Figure 12).
As stated above, by taking the case of just the vehicles which did change their pseudonyms, we get the achieved normalized traceability as shown in Figure 12. The results always give WHISPER the leading position since it outperforms the other schemes but this time by achieving an even higher privacy level represented in a lower than 10 % of normalized traceability. The same order of performance remains: CPN, RSP, then SLOW. However, SLOW has achieved better-normalized traceability of about 30 % due to removing vehicles that did not change their pseudonyms at all from the calculation.

5.3. Pseudonym Consumption

Also considered is the QoS metric. The pseudonym consumption has multiple effects and impacts like the use of different pseudonyms (thus, certificates), extra-communications with the corresponding authorities to refill pseudonyms, affecting the routing algorithms [30], etc. For this reason, the pseudonym consumption metric is crucial. With a clear view, Figure 13 shows that SLOW is the less-pseudonym consuming scheme followed by RSP and WHISPER respectively, while CPN had a considerable high pseudonyms consumption level. We argue this by the scheme’s nature, when the trigger of k neighbors is satisfied, a pseudonym change is performed and as k was taken as 2 by the default parameters, a lot of pseudonym changes occurred.

6. Discussion

For an overall investigation, the performances of CPN, RSP, SLOW, and WHISPER were evaluated in terms of (1) location privacy that gives WHISPER the leading in both (a) traceability and (b) normalized traceability and (2) QoS comes in the favor of SLOW. CPN, under the default parameters (i.e., k = 2 ), has resulted in a very high pseudonym consumption, thus, considered as a non-wise choice for a deployed pseudonym scheme. The results, clearly show that WHISPER has a very good level of privacy since it achieves traceability ranging in the interval of 10% to 20%. In terms of normalized traceability, WHISPER outperformed the other schemes achieving an even higher privacy level.
Despite WHISPER consuming more pseudonyms (with a remarkably low amount in general) than SLOW and RSP, having it a very high location privacy level represented in the traceability and the normalized traceability gives it the leading position. Thus, we can say that WHISPER, as also compared and summarized in Table 4, has outperformed the other schemes especially in both the safety and location privacy that are known to be on the top of the security requirements.
Except for the evaluation comparison, WHISPER is an important solution that offers privacy preservation while maintaining at the same time road-safety. This is achieved since vehicles are only hidden from the tracker (occasionally) and not from the close vehicles (always), which makes the use of WHISPER an advantageous method that comes in favor of safety and privacy.

7. Conclusions and Future Work

In this paper, WHISPER, a novel location privacy-preserving scheme that is based on reducing the transmission range while sending the safety beacons was proposed. We presented WHISPER protocols, techniques, and algorithms and compared them against other methods, namely CPN, RSP, and SLOW in terms of the location privacy level (traceability, normalized traceability) and QoS (pseudonyms consumption) metrics. WHISPER clearly outperformed the other schemes in location privacy evaluation, which is an important security requirement, but consumed, lightly, more pseudonyms than SLOW and RSP as the QoS evaluation demonstrated. Furthermore, WHISPER showed its robustness during the evaluation and also provided (1) road safety that is missed by all other silent period schemes in conjunction with (2) location privacy.
The reason why WHISPER is a road-safety mechanism is that the vehicle is only hidden from the tracker (occasionally) and not from close vehicles (always) which made the use of WHISPER (or at least, the change of transmission range protocol) an advantageous feature that works in favor of safety and privacy alike.
As this new technique has not been exploited before in the privacy field, we intend on evaluating the achieved location privacy level versus an internal attacker i.e., when vehicles act as malicious eavesdropping stations in order to bypass the reduction of transmission range and increase the coverage of the attacker. Also, some of the values (e.g., existing in Algorithm 2) are set heuristically, evaluating the performance by optimally adjusting those values dynamically would certainly enhance the obtained privacy level of WHISPER. Moreover technologies like blockchain [47], cryptography [48], IDSs [49], and Edge Computing [50] which are widely recognized as key enablers for IoV could be integrated or used in parallel with our solution. Finally, using other metrics like the number of sent BSMs, the number of verified signatures, and evaluating WHISPER’s performance under different scenarios like the free-way model are some of our future plans.

Author Contributions

Conceptualization, M.B., N.L. and L.M.; Methodology, M.B., A.A.A.A. and L.M.; Software, M.B., H.J., M.A.F. and N.L.; Validation, M.A.F., N.L. and L.M.; formal analysis, A.A.A.A., M.A.F. and N.L.; investigation, M.B., N.L., A.A.A.A. and M.A.F.; resources, M.A.F., N.L. and M.B.; data curation, M.B., H.J., N.L. and L.M.; writing—original draft preparation, M.B., N.L. and M.A.F.; writing—review and editing, A.A.A.A., H.J. and L.M.; visualization, M.A.F., M.B., N.L. and L.M.; supervision, N.L., A.A.A.A. and M.A.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy reasons.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  2. Al-Sultan, S.; Al-Doori, M.M.; Al-Bayatti, A.H.; Zedan, H. A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
  3. Wang, J.; Shao, Y.; Ge, Y.; Yu, R. A survey of vehicle to everything (v2x) testing. Sensors 2019, 19, 334. [Google Scholar] [CrossRef] [Green Version]
  4. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of internet of vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
  5. Lin, K.; Li, C.; Li, Y.; Savaglio, C.; Fortino, G. Distributed learning for vehicle routing decision in software defined Internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020. [Google Scholar] [CrossRef]
  6. Fortino, G.; Savaglio, C.; Spezzano, G.; Zhou, M. Internet of Things as System of Systems: A Review of Methodologies, Frameworks, Platforms, and Tools. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 223–236. [Google Scholar] [CrossRef]
  7. Zhang, M.; Ali, G.M.N.; Chong, P.H.J.; Seet, B.C.; Kumar, A. A novel hybrid mac protocol for basic safety message broadcasting in vehicular networks. IEEE Trans. Intell. Transp. Syst. 2019, 21, 4269–4282. [Google Scholar] [CrossRef]
  8. Lu, R.; Lin, X.; Zhu, H.; Ho, P.H.; Shen, X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1229–1237. [Google Scholar]
  9. Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Gueroui, A.M. Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. Int. J. Strateg. Inf. Technol. Appl. 2019, 10, 33–54. [Google Scholar] [CrossRef]
  10. Ferrag, M.A.; Maglaras, L.; Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Commun. Surv. Tutor. 2017, 19, 3015–3045. [Google Scholar] [CrossRef]
  11. Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Lagraa, N.; Ferrag, M.A. Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 2020, 55, 102618. [Google Scholar] [CrossRef]
  12. Maglaras, L.A.; Al-Bayatti, A.H.; He, Y.; Wagner, I.; Janicke, H. Social internet of vehicles for smart cities. J. Sens. Actuator Netw. 2016, 5, 3. [Google Scholar] [CrossRef] [Green Version]
  13. Eckhoff, D.; Sommer, C. Readjusting the privacy goals in Vehicular Ad-Hoc Networks: A safety-preserving solution using non-overlapping time-slotted pseudonym pools. Comput. Commun. 2018, 122, 118–128. [Google Scholar] [CrossRef]
  14. Pan, Y.; Li, J. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 2013, 36, 1599–1609. [Google Scholar] [CrossRef]
  15. Huang, L.; Matsuura, K.; Yamane, H.; Sezaki, K. Enhancing wireless location privacy using silent period. In Proceedings of the 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; pp. 1187–1192. [Google Scholar]
  16. Buttyán, L.; Holczer, T.; Weimerskirch, A.; Whyte, W. Slow: A practical pseudonym changing scheme for location privacy in vanets. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; pp. 1–8. [Google Scholar]
  17. Huang, R.; Ying, B.; Nayak, A. Protecting location privacy in opportunistic mobile social networks. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–8. [Google Scholar]
  18. Babaghayou, M.; Labraoui, N.; Ari, A.A.A. Location-Privacy Evaluation within the Extreme Points Privacy (EPP) Scheme for VANET Users. Int. J. Strateg. Inf. Technol. Appl. 2019, 10, 44–58. [Google Scholar] [CrossRef]
  19. Beresford, A.R.; Stajano, F. Location privacy in pervasive computing. IEEE Pervasive Comput. 2003, 2, 46–55. [Google Scholar] [CrossRef] [Green Version]
  20. Freudiger, J.; Raya, M.; Félegyházi, M.; Papadimitratos, P.; Hubaux, J.P. Mix-zones for location privacy in vehicular networks. In Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, BC, Canada, 14–17 August 2007. [Google Scholar]
  21. Petit, J.; Schaub, F.; Feiri, M.; Kargl, F. Pseudonym schemes in vehicular networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 228–255. [Google Scholar] [CrossRef]
  22. European Telecommunications Standards Institute (ETSI), TR. Intelligent Transport Systems (ITS); Security; Pre-Standardization Study on Pseudonym Change Management. 2018. Available online: https://www.etsi.org/deliver/etsi_tr/103400_103499/103415/01.01.01_60/tr_103415v010101p.pdf (accessed on 20 March 2021).
  23. European Telecommunications Standards Institute (ETSI), TS. Intelligent Transport Systems (ITS); Security; Security Management Messages Communication Requirements and Distribution Protocols. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/103600_103699/103601/01.01.01_60/ts_103601v010101p.pdf (accessed on 20 March 2021).
  24. Eckhoff, D.; German, R.; Sommer, C.; Dressler, F.; Gansen, T. Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Commun. Mag. 2011, 49, 126–133. [Google Scholar] [CrossRef]
  25. Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2012, 61, 86–96. [Google Scholar] [CrossRef] [Green Version]
  26. Tomandl, A.; Scheuer, F.; Federrath, H. Simulation-based evaluation of techniques for privacy protection in VANETs. In Proceedings of the 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 8–10 October 2012; pp. 165–172. [Google Scholar]
  27. Emara, K. Poster: PREXT: Privacy extension for veins VANET simulator. In Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 1–2. [Google Scholar]
  28. Emara, K.; Woerndl, W.; Schlichter, J. CAPS: Context-aware privacy scheme for VANET safety applications. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 24–26 June 2015; p. 21. [Google Scholar]
  29. Zidani, F.; Semchedine, F.; Ayaida, M. Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs. Comput. Electr. Eng. 2018, 71, 359–371. [Google Scholar] [CrossRef]
  30. Schoch, E.; Kargl, F.; Leinmüller, T.; Schlott, S.; Papadimitratos, P. Impact of pseudonym changes on geographic routing in vanets. In Proceedings of the European Workshop on Security in Ad-hoc and Sensor Networks, Hamburg, Germany, 20–21 September 2006; pp. 43–57. [Google Scholar]
  31. Goudarzi, F.; Asgari, H. Non-Cooperative Beacon Power Control for VANETs. IEEE Trans. Intell. Transp. Syst. 2019, 20, 777–782. [Google Scholar] [CrossRef]
  32. Mussa, S.A.B.; Manaf, M.; Ghafoor, K.Z. Beaconing and transmission range adaptation approaches in vehicular ad hoc networks: Trends & research challenges. In Proceedings of the 2014 International Conference on Computational Science and Technology (ICCST), Kota Kinabalu, Malaysia, 27–28 August 2014; pp. 1–6. [Google Scholar]
  33. Song, L.; Sun, G.; Yu, H.; Du, X.; Guizani, M. Fbia: A fog-based identity authentication scheme for privacy preservation in internet of vehicles. IEEE Trans. Veh. Technol. 2020, 69, 5403–5415. [Google Scholar] [CrossRef]
  34. Ferrag, M.A.; Ahmim, A. ESSPR: An efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network. Telecommun. Syst. 2017, 66, 481–503. [Google Scholar] [CrossRef]
  35. Aman, M.N.; Javaid, U.; Sikdar, B. A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
  36. Sutrala, A.K.; Bagga, P.; Das, A.K.; Kumar, N.; Rodrigues, J.J.; Lorenz, P. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Trans. Veh. Technol. 2020, 69, 5535–5548. [Google Scholar] [CrossRef]
  37. Dwivedi, S.K.; Amin, R.; Vollala, S.; Chaudhry, R. Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities. Comput. Electr. Eng. 2020, 86, 106719. [Google Scholar] [CrossRef]
  38. Zhang, W.; Li, G. An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment. IEEE Access 2020, 8, 64461–64474. [Google Scholar] [CrossRef]
  39. Vasudev, H.; Deshpande, V.; Das, D.; Das, S.K. A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles. IEEE Trans. Veh. Technol. 2020, 69, 6709–6717. [Google Scholar] [CrossRef]
  40. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.; Choo, K.K.R.; Park, Y. On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 2021, 70, 1736–1751. [Google Scholar] [CrossRef]
  41. Nowatkowski, M.E.; Wolfgang, J.E.; McManus, C.; Owen, H.L. The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS. In Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), Concord, NC, USA, 18–21 March 2010; pp. 380–383. [Google Scholar]
  42. Bouchelaghem, S.; Omar, M. Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput. Electr. Eng. 2020, 82, 106557. [Google Scholar] [CrossRef]
  43. Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
  44. Varga, A.; Hornig, R. An overview of the OMNeT++ simulation environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Marseille, France, 3–7 March 2008; p. 60. [Google Scholar]
  45. Sommer, C.; German, R.; Dressler, F. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef] [Green Version]
  46. Emara, K.; Woerndl, W.; Schlichter, J. Context-based pseudonym changing scheme for vehicular adhoc networks. arXiv 2016, arXiv:1607.07656. [Google Scholar]
  47. Merzougui, S.E.; Ferrag, M.A.; Friha, O.; Maglaras, L. EASBF: An Efficient Authentication Scheme over Blockchain for Fog Computing-enabled Internet of Vehicles. J. Inf. Secur. Appl. 2021, 59, 102802. [Google Scholar]
  48. Tselikis, C.; Douligeris, C.; Maglaras, L.; Mitropoulos, S. On the conference key distribution system with user anonymity. J. Inf. Secur. Appl. 2020, 54, 102556. [Google Scholar] [CrossRef]
  49. Kosmanos, D.; Argyriou, A.; Maglaras, L. Estimating the relative speed of RF jammers in VANETs. Secur. Commun. Networks 2019. [Google Scholar] [CrossRef]
  50. Xu, X.; Xue, Y.; Qi, L.; Yuan, Y.; Zhang, X.; Umer, T.; Wan, S. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comput. Syst. 2019, 96, 89–100. [Google Scholar] [CrossRef]
Figure 1. Vehicle to Everything (V2X) technology illustration.
Figure 1. Vehicle to Everything (V2X) technology illustration.
Sensors 21 02443 g001
Figure 2. Basic Safety Message (BSM) beacon format.
Figure 2. Basic Safety Message (BSM) beacon format.
Sensors 21 02443 g002
Figure 3. The different entities of the vehicular network.
Figure 3. The different entities of the vehicular network.
Sensors 21 02443 g003
Figure 4. Threat model and its resources, capabilities, and coverage.
Figure 4. Threat model and its resources, capabilities, and coverage.
Sensors 21 02443 g004
Figure 5. The used coverage mode (moderate mode) details.
Figure 5. The used coverage mode (moderate mode) details.
Sensors 21 02443 g005
Figure 6. The state diagram of WHISPER.
Figure 6. The state diagram of WHISPER.
Sensors 21 02443 g006
Figure 7. WHISPER behavior in the presence and influence of general neighbors on the transmission range adjustment.
Figure 7. WHISPER behavior in the presence and influence of general neighbors on the transmission range adjustment.
Sensors 21 02443 g007
Figure 8. WHISPER behavior in the presence and influence of road neighbors on the transmission range adjustment.
Figure 8. WHISPER behavior in the presence and influence of road neighbors on the transmission range adjustment.
Sensors 21 02443 g008
Figure 9. WHISPER, pseudonym change process triggered by a close neighbor’s status.
Figure 9. WHISPER, pseudonym change process triggered by a close neighbor’s status.
Sensors 21 02443 g009
Figure 10. The block diagram of the different used simulation tools.
Figure 10. The block diagram of the different used simulation tools.
Sensors 21 02443 g010
Figure 11. The achieved traceability by SLOW, Random Silent Period (RSP), Cooperative Pseudonym Change (CPN), and WHISPER within different densities.
Figure 11. The achieved traceability by SLOW, Random Silent Period (RSP), Cooperative Pseudonym Change (CPN), and WHISPER within different densities.
Sensors 21 02443 g011
Figure 12. The achieved normalized traceability by SLOW, RSP, CPN, and WHISPER within different densities.
Figure 12. The achieved normalized traceability by SLOW, RSP, CPN, and WHISPER within different densities.
Sensors 21 02443 g012
Figure 13. The pseudonyms changes (consumption) evaluation of CPN, WHISPER, RSP, and SLOW within different densities.
Figure 13. The pseudonyms changes (consumption) evaluation of CPN, WHISPER, RSP, and SLOW within different densities.
Sensors 21 02443 g013
Table 1. Comparison of related works.
Table 1. Comparison of related works.
YearSchemeNetwork ModelTechnique UsedPros (+)Cons (−)
2007Freudiger et al. [20]Vehicular networksSymmetric key-based cryptography+ Provides location privacy− The proposed scheme did not consider the internal attacker scenario
2009Buttyán et al. [16]Vehicular networksPseudonym changing scheme+ Ensures both silent periods and synchronized pseudonym change in time and space− Intrusion detection is not considered
2011Eckhoff et al. (2011) [24]Intelligent transportation systemsA time-slotted pool to manage pseudonyms by each vehicle+ Affordable location privacy− Resistance against Sybil attacks is not considered
2012Lu et al. [25]Vehicular networksThe feature of social spots, which are places where vehicles meet more frequently+ Provides location privacy− Limited analysis against threat models
2013Pan and Li [14]Vehicular networksCooperative pseudonym change scheme based on the number of neighbors+ Provides anonymity− Intrusion detection is not considered
2017Ferrag and Ahmim [34]Vehicular peer-to-peer social networkSearchable encryption with vehicle proxy re-encryption+ Provide privacy for resources, authentication and data integrity of the demand’s source− Limited analysis with threat models against botnet attacks
2018Zidani et al. [29]Vehicular ad-hoc networkEstimation of neighbors position privacy scheme with an adaptive beaconing approach+ Provides location privacy− Limited analysis against threat models
2019Babaghayou et al. [18]Vehicular networksLocation-privacy evaluation within the extreme points privacy+ Provides location privacy− Limited analysis against threat models
2020Aman et al. [35]Internet of vehiclesPhysical unclonable functions+ Reduces the overhead of authentication and improves the throughput of application layer packets− Resistance against DDoS attacks
2020Song et al. [33]Internet of vehiclesFog-based identity authentication scheme+ Reduces the burden on the traffic control center− Resistance against Botnet attacks
2020Sutrala et al. [36]Internet of vehiclesElliptic Curve Cryptography (ECC) technique+ Secures against a passive/active adversary through various security analysis− Communication and computation overhead
2020Dwivedi et al. [37]Internet of vehiclesBlockchain technology+ Supports data immutability property− The limited analysis against the threat models
2020Zhang and Li [38]Internet of vehicles- Task allocation and data aggregation mechanism - Robin Steiner bargaining game model+ Encourages selfish nodes to perform data transmission and reduce time delay− Limited analysis against threat models
2020Vasudev et al. [39]Vehicle to Vehicle (V2V) communication in the Internet of VehiclesLightweight mutual authentication protocol+ Secure communication, while minimizing computational cost− Limited analysis against threat models
2021Kamal et al. [39]V2V communication in the Internet of VehiclesBlockchain technology and channel characteristics of wireless networks in V2V communication+ Provides real time adversary detection within the network− Energy and computation overhead
2021Bagga et al. [40]Internet of Vehicles-enabled intelligent transportation systemMutual authentication and key agreement protocol+ Secures against a passive/active adversary through various security analysis− Communication and computational overhead
Table 2. WHISPER keywords, concepts, and detailed definitions.
Table 2. WHISPER keywords, concepts, and detailed definitions.
The ConceptIts Definition
The different speed levels (km/h)Low (≥0 & <18), Medium (≥18 & <36), beyond-Medium (≥36 & <54), High (≥54)
M y _ P o s and H i s _ P o s ( x , y , z )The position of v i which does the calculation and v j which sends the BSM
M y _ S p e e d and H i s _ S p e e d (km/h)The speed of v i which does the calculation and v j which sends the BSM
S p e e d (km/h)The highest speed that was encountered while v i was waiting
D i s t (m)The distance between the sending vehicle v j and the receiving vehicle v i
C a l c _ D i s t ( A , B ) (m)Calculates the distance between point A and B
B S M . X ( ) ( d e p e n d s ) X ( ) is the method applied on BSM to retrieve different fields like position, speed, etc.
G e n e r a l N R (m)A virtual range with the same value for each receiving vehicle v i . This range determines
whether a sending vehicle v j is considered as a “General Neighbor” to v i or not
If v j is inside that range when sending its BSM, then it is considered to be v i ’s
General Neighbor
R o a d N R (m)A virtual range with the same value for each receiving vehicle v i . This range determines
whether a sending vehicle v j is considered as a “Road Neighbor” to v i or not
v j is only considered as a Road Neighbor to v i if it is inside the R o a d N R range and if
it and v i share the same road segment
C l o s e N R (m)A virtual range with the same value for each receiving vehicle v i . This range determines
whether a sending vehicle v j is considered as a “Close Neighbor” to v i or not. v j is only
considered as a Close Neighbor if it is inside the C l o s e N R range. Noting that C l o s e N R
range ought to be very small in order to let both v i and v j be as much indistinguishable
as possible to confuse the attacker when doing the pseudonym change action
C l o s e ( b o o l e a n )A local variable that each vehicle v i has. Being True means that v i is currently at the
proximity of another vehicle v j . In the other case, when v i is alone (with regard to the
C l o s e N R range), its value becomes False (to achieve road-safety, entertainment,
congestion-aware actions, etc.)
P r o c c e s s _ B e a c o n ( B S M ) ( p r o c e d u r e )This procedure uses the received BSM packet for the IoV objectives and requirements
(to achieve road-safety, entertainment, congestion-aware actions, etc.)
O B U _ I s _ O n ( b o o l e a n )A true or false value which means a sending vehicle v i is on or off respectively
B e a c o n _ I n t e r v a l _ T i m e (s)An amount of time in where v i is waiting before sending the next BSM
P r e p a r e _ B e a c o n ( B S M ) ( B e a c o n )Generates a BSM packet that will be ready for broadcasting
n i c . m a c 80211 p . t x P o w e r ( m i l l i w a t t )The transmission power given to the network interface used to control the transmission
range of v i
C o u n t e r ( n u m b e r )A counter variable used later on to decide the pseudonym change action
D e f _ V a l ( n u m b e r )The default value of c o u n t e r . It is used to both reinitialize c o u n t e r and to do a test to
find out the eligibility of v i for changing its pseudonym
S e n d _ B e a c o n ( B S M ) ( B e a c o n )Gives the BSM packet to the lower layers which will broadcast it to the neighbors
C h e c k i n g _ P s e u d o n y m _ C h a n g e _ T r i g g e r ( ) Checking whether the trigger of v i for changing its pseudonym is met or not
( p r o c e d u r e )
P s e u d o n y m _ C h a n g e ( ) ( p r o c e d u r e )Once the conditions are met and once it is executed correctly, v i acquires a new
pseudonym (and certificate respectively)
Table 3. Simulation parameters and values.
Table 3. Simulation parameters and values.
ParametersValue
MobilityVehicles NumberSimultaneously = 50, 100, 150, 200
Total = 100, 200, 300, 400
Insertion methodQuasi-Instant
(first second insertion)
Mobility ModelRandomTrips with minimum
distance = 1500 m
EnvironmentUsed MapManhattan grid model
9 roads, 200 m per segment
Map size2000 × 2000 m 2
4 km 2
Simulation Time300 s
EvaluationPrivacy metricsTraceability
N_Traceability
Pseudonym usage/ consumptionNumber of changed-pseudonyms
StrategySLOWSpeed threshold = 8 m/s
Silence threshold = 5 s
RSPPseudonym duration = 60 s
Silence period = from 3 to 9 s randomly
CPNNeighbors radius = 100 m
Neighbors threshold = 2
WHISPERRoad neighbors radius = 100 m
General neighbors radius = 30 m
Close neighbors radius = 30 m
Counter default value = 50
Table 4. A brief comparison of SLOW, RSP, CPN, and WHISPER strategies according to a set of metrics.
Table 4. A brief comparison of SLOW, RSP, CPN, and WHISPER strategies according to a set of metrics.
Staying SilentMonitoring NeighborsPseudonyms ConsumptionSafety EnsuringMore Efficiency When
SLOW [16]LowDriving in low speeds, hence, keeping silence
RSP [15]LowEntering silence and changing pseudonyms synchronously
CPN [14]Very highThe set of vehicles happens to be large
WHISPERMediumLow transmission power condition is satisfied
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Babaghayou, M.; Labraoui, N.; Abba Ari, A.A.; Ferrag, M.A.; Maglaras, L.; Janicke, H. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors 2021, 21, 2443. https://0-doi-org.brum.beds.ac.uk/10.3390/s21072443

AMA Style

Babaghayou M, Labraoui N, Abba Ari AA, Ferrag MA, Maglaras L, Janicke H. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors. 2021; 21(7):2443. https://0-doi-org.brum.beds.ac.uk/10.3390/s21072443

Chicago/Turabian Style

Babaghayou, Messaoud, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, and Helge Janicke. 2021. "WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles" Sensors 21, no. 7: 2443. https://0-doi-org.brum.beds.ac.uk/10.3390/s21072443

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop