This paper proposes a mechanism for sustaining privacy of a vehicle in a vehicular ad hoc network (VANET) through pseudonym update. In a VANET, vehicles on the road are involved in dissemination of information as they move. An association can be formed between the physical location of the source vehicle and the transmitted messages. This relationship between the physical vehicle and its identity can breach its privacy. In this work, a strategy for optimal pseudonym update for maximizing privacy has been formulated when a vehicle is being observed by adversaries with different capabilities. Results indicate that updating pseudonyms in accordance to the strategy maximizes the privacy of a vehicle in the given situation.<\/p>","DOI":"10.4018\/jghpc.2010040102","type":"journal-article","created":{"date-parts":[[2010,4,30]],"date-time":"2010-04-30T16:23:32Z","timestamp":1272644612000},"page":"12-22","source":"Crossref","is-referenced-by-count":7,"title":["Mechanism for Privacy Preservation in VANETS"],"prefix":"10.4018","volume":"2","author":[{"given":"Brijesh K.","family":"Chaurasia","sequence":"first","affiliation":[{"name":"Indian Institute of Information Technology, India"}]},{"given":"Shekhar","family":"Verma","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology, India"}]},{"given":"G. S.","family":"Tomar","sequence":"additional","affiliation":[{"name":"Malwa Institute of Technology and Management, India"}]}],"member":"2432","reference":[{"key":"jghpc.2010040102-0","unstructured":"Clau, B. S., & Schiffner, S. (2006). Structuring Anonymity Metrics. In Proceedings of the DIM\u2019O6 (pp. 55-62)."},{"key":"jghpc.2010040102-1","doi-asserted-by":"crossref","unstructured":"Dotzer, F. (2005). Privacy Issues in Vehicular Ad Hoc Networks. In Proceedings of the Workshop on Privacy Enhancing Technologies, Dubr, Croatia (pp. 197-209).","DOI":"10.1007\/11767831_13"},{"key":"jghpc.2010040102-2","doi-asserted-by":"crossref","unstructured":"Fonseca, E., Festag, A., Baldessari, R., & Aguiar, R. (2007). Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In Proceedings of the IEEE Wireless Communication & Networking Conference (WCNC2007).","DOI":"10.1109\/WCNC.2007.625"},{"key":"jghpc.2010040102-3","doi-asserted-by":"crossref","unstructured":"Gerlach, M., & Guttler, F. (2007). Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In Proceedings of 65th Vehicular Technology Conference (VTC2007-l) (pp. 2521-2525).","DOI":"10.1109\/VETECS.2007.519"},{"key":"jghpc.2010040102-4","doi-asserted-by":"crossref","unstructured":"Khabazian, M., & Ali, M. K. (2007). Generalized Performance Modeling of Vehicular Ad Hoc Networks (VANETs). In Proceedings of the ISCC 2007 (pp. 51-56).","DOI":"10.1109\/ISCC.2007.4381597"},{"key":"jghpc.2010040102-5","doi-asserted-by":"crossref","unstructured":"Li, M., Sampigethaya, K., Huang, L., & Poovendran, R. (2006). Swing & swap: user-centric approaches towards maximizing location privacy. In Proceedings of the 5th ACM workshop on Privacy in electronic society (WPES '06) (pp. 19-27).","DOI":"10.1145\/1179601.1179605"},{"key":"jghpc.2010040102-6","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., & Raya, M. (2007). Architecture for Secure and Private Vehicular Communications. In Proceedings of the Int\u2019l Conf. on ITS Telecomm (ITST 2007), Sophia Antipolis, France.","DOI":"10.1109\/ITST.2007.4295890"},{"key":"jghpc.2010040102-7","unstructured":"Pfitzmann, A., & Hansen, M. (2004). Anonymity, unobservability, and pseudonymity: A proposal for terminology. In Proceedigns of the HBCC04 (Vol. 21)."},{"key":"jghpc.2010040102-8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1102219.1102223","article-title":"The Security of Vehicular Ad Hoc Networks. In","volume":"05","author":"M.Raya","year":"2005","journal-title":"Proceedings of SASN"},{"issue":"1","key":"jghpc.2010040102-9","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks.","volume":"15","author":"M.Raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"jghpc.2010040102-10","unstructured":"Samarati, P., & Sweeney, L. (1998). Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (Tech. Rep. SRI-CSL-98-04). CS Lab, SRI International."},{"issue":"8","key":"jghpc.2010040102-11","first-page":"1569","article-title":"AMOEBA: Robust Location Privacy Scheme for VANET.","volume":"25","author":"K.Sampigethaya","year":"2007","journal-title":"IEEE JSAC"},{"key":"jghpc.2010040102-12","doi-asserted-by":"crossref","unstructured":"Sha, K., Xi, Y., Shi, W., Schwiebert, L., & Zhang, T. (2006). Adaptive Privacy-Preserving Authentication in Vehicular Networks. In Proceedings of IEEE International Workshop on Vehicle Communication and Applications.","DOI":"10.1109\/CHINACOM.2006.344746"},{"key":"jghpc.2010040102-13","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhang, C., & Fang, Y. (2007). An id-based framework achieving privacy and non-repudiation in Vehicular ad hoc networks. In Proceedings of the Military Communications Conference (MILCOM).","DOI":"10.1109\/MILCOM.2007.4454834"},{"key":"jghpc.2010040102-14","author":"K. S.Trivedi","year":"2002","journal-title":"Probability and Statistics with Reliability, Queuing, and Computer Science Applications"}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=43881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:03:45Z","timestamp":1654103025000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jghpc.2010040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,4,1]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jghpc.2010040102","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,1]]}}}