2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019
One of the main challenges for communicationin Vehicular Ad Hoc Networks (VANETs) is efficient ne... more One of the main challenges for communicationin Vehicular Ad Hoc Networks (VANETs) is efficient network channel utilization for the transmission of network packets. With the growing number of vehicles in the network, the number of safety messages increases quickly, which results inthe network channel congestion. In this paper, we introduce anew approach to adapt the transmission power, which is based on the vehicle density of the network. The aim is to reduce congestion on the network channel and improve the overall performance of network. Our simulation results indicate that this approach can lead to enhanced performance in terms ofreduced packet loss and inter-packet delay.
The use of pseudonyms has been proposed in VANETs to enhance location privacy of users. In order ... more The use of pseudonyms has been proposed in VANETs to enhance location privacy of users. In order to prevent tracking, the pseudonyms associated with a vehicle must be changed frequently. A pseudonym change strategy (PCS) determines the conditions under which pseudonyms should change. An effective PCS is critical for maintaining the privacy of vehicles. Many different PCS have been proposed in recent years. It is important to study the performance of these PCS against intelligent and realistic attacker(s), before actual deployment in vehicles. In this paper, we propose a novel technique for attacker placement and compare the performance of different PCS, using the proposed placement schemes as well as random placement. We also evaluate PCS under different attacker capabilities and traffic conditions. Results indicate that the intelligent attacker placement can have a significant impact on tracking success and can be used to highlight vulnerabilities of a PCS under different traffic c...
The area of location privacy in VANET is getting more attention after the emergence of V2X techno... more The area of location privacy in VANET is getting more attention after the emergence of V2X technologies. As the security and privacy are important for the customer's safety, the vehicles equipped with V2X technology must have strong techniques to preserve the security and privacy. Pseudonymous authentication proves to satisfy these requirements. The pseudonyms used in this process are subjected to change frequently as the using same pseudonym can be used for tracking the vehicle. Therefore, the pseudonym changing strategies are required for the unlinkability of a pseudonym, untraceability of the vehicle and higher location privacy. In this survey, we examine and discuss the general pseudonym authentication, the requirements, security threats, attack models, privacy metrics and provide a detailed analytical review of pseudonym changing strategies. It gives extensive classi cation of the strategies with a comparison based on various parameters which will help in understanding the ...
Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars a... more Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.
Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share informa... more Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share information such as current position, speed, and vehicle status on a regular basis. This information can be collected to obtain private information about vehicles/drivers, such as home or office locations and frequently visited places, creating serious privacy vulnerabilities. The use of pseudonyms, rather than actual vehicle IDs, can alleviate this problem and several different Pseudonym Management Techniques (PMTs) have been proposed in the literature. These PMTs are typically evaluated assuming a random placement of attacking stations. However, an adversary can utilize knowledge of traffic patterns and PMTs to place eavesdropping stations in a more targeted manner, leading to an increased tracking success rate. In this paper, we propose two new adversary placement strategies and study the impact of intelligent adversary placement on tracking success using different PMTs. The results indicate...
The deployment of connected and autonomous vehicles is expected to increase rapidly in the coming... more The deployment of connected and autonomous vehicles is expected to increase rapidly in the coming decade. For successful operation, it is critical to maintain the security and privacy of the communication messages exchanged among such vehicles. One important aspect of this is to maintain the location privacy of vehicles/users that use unencrypted basic safety messages (BSM) to exchange information with nearby vehicles. The use of temporary identifiers called pseudonyms have been proposed for protecting location privacy. A pseudonym change strategy (PCS) determines the conditions under which pseudonyms should change. The goal is to change pseudonyms in a way that prevents an attacker from linking multiple pseudonyms to the same vehicle. In this paper we explore how an intelligent attacker placement scheme can impact the success rate for linking pseudonyms. We propose a new speed-based attacker placement algorithm that can be used to evaluate different PCS. Simulation results indicate that the proposed scheme is able to increase the rate for successfully linking vehicle pseudonyms.
2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019
One of the main challenges for communicationin Vehicular Ad Hoc Networks (VANETs) is efficient ne... more One of the main challenges for communicationin Vehicular Ad Hoc Networks (VANETs) is efficient network channel utilization for the transmission of network packets. With the growing number of vehicles in the network, the number of safety messages increases quickly, which results inthe network channel congestion. In this paper, we introduce anew approach to adapt the transmission power, which is based on the vehicle density of the network. The aim is to reduce congestion on the network channel and improve the overall performance of network. Our simulation results indicate that this approach can lead to enhanced performance in terms ofreduced packet loss and inter-packet delay.
The use of pseudonyms has been proposed in VANETs to enhance location privacy of users. In order ... more The use of pseudonyms has been proposed in VANETs to enhance location privacy of users. In order to prevent tracking, the pseudonyms associated with a vehicle must be changed frequently. A pseudonym change strategy (PCS) determines the conditions under which pseudonyms should change. An effective PCS is critical for maintaining the privacy of vehicles. Many different PCS have been proposed in recent years. It is important to study the performance of these PCS against intelligent and realistic attacker(s), before actual deployment in vehicles. In this paper, we propose a novel technique for attacker placement and compare the performance of different PCS, using the proposed placement schemes as well as random placement. We also evaluate PCS under different attacker capabilities and traffic conditions. Results indicate that the intelligent attacker placement can have a significant impact on tracking success and can be used to highlight vulnerabilities of a PCS under different traffic c...
The area of location privacy in VANET is getting more attention after the emergence of V2X techno... more The area of location privacy in VANET is getting more attention after the emergence of V2X technologies. As the security and privacy are important for the customer's safety, the vehicles equipped with V2X technology must have strong techniques to preserve the security and privacy. Pseudonymous authentication proves to satisfy these requirements. The pseudonyms used in this process are subjected to change frequently as the using same pseudonym can be used for tracking the vehicle. Therefore, the pseudonym changing strategies are required for the unlinkability of a pseudonym, untraceability of the vehicle and higher location privacy. In this survey, we examine and discuss the general pseudonym authentication, the requirements, security threats, attack models, privacy metrics and provide a detailed analytical review of pseudonym changing strategies. It gives extensive classi cation of the strategies with a comparison based on various parameters which will help in understanding the ...
Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars a... more Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.
Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share informa... more Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share information such as current position, speed, and vehicle status on a regular basis. This information can be collected to obtain private information about vehicles/drivers, such as home or office locations and frequently visited places, creating serious privacy vulnerabilities. The use of pseudonyms, rather than actual vehicle IDs, can alleviate this problem and several different Pseudonym Management Techniques (PMTs) have been proposed in the literature. These PMTs are typically evaluated assuming a random placement of attacking stations. However, an adversary can utilize knowledge of traffic patterns and PMTs to place eavesdropping stations in a more targeted manner, leading to an increased tracking success rate. In this paper, we propose two new adversary placement strategies and study the impact of intelligent adversary placement on tracking success using different PMTs. The results indicate...
The deployment of connected and autonomous vehicles is expected to increase rapidly in the coming... more The deployment of connected and autonomous vehicles is expected to increase rapidly in the coming decade. For successful operation, it is critical to maintain the security and privacy of the communication messages exchanged among such vehicles. One important aspect of this is to maintain the location privacy of vehicles/users that use unencrypted basic safety messages (BSM) to exchange information with nearby vehicles. The use of temporary identifiers called pseudonyms have been proposed for protecting location privacy. A pseudonym change strategy (PCS) determines the conditions under which pseudonyms should change. The goal is to change pseudonyms in a way that prevents an attacker from linking multiple pseudonyms to the same vehicle. In this paper we explore how an intelligent attacker placement scheme can impact the success rate for linking pseudonyms. We propose a new speed-based attacker placement algorithm that can be used to evaluate different PCS. Simulation results indicate that the proposed scheme is able to increase the rate for successfully linking vehicle pseudonyms.
Uploads
Papers by Ikjot Saini