全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)

DOI: 10.4236/ait.2023.134006, PP. 109-118

Keywords: Vehicular Ad-Hoc Networks (VANETs), Privacy and Data Protection, Cybersecurity, Pseudonymization Schemes, Internet of Vehicles (IoV)

Full-Text   Cite this paper   Add to My Lib

Abstract:

As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles.

References

[1]  Wiedersheim, B., Ma, Z., Kargl, F. and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why Simple Pseudonym Change Is not Enough. 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), Kranjska Gora, 3-5 February 2010, 176-183,
https://doi.org/10.1109/WONS.2010.5437115
[2]  https://ieeexplore.ieee.org/abstract/document/5437115
[3]  Al-Kahtani, M.S. (2012) Survey on Security Attacks in Vehicular Ad Hoc Networks (vanets). In 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, 12-14 December 2012, 1-9.
https://doi.org/10.1109/ICSPCS.2012.6507953
[4]  United-Nations (1948) Universal Declaration of Human Rights. United Nations Portal.
https://www.un.org/en/about-us/universal-declaration-of-human-rights
[5]  Warren, S.D. and Brandeis, L.D. (1890) The Right to Privacy. Harvard Law Review IV, 4, 193-220.
https://www.jstor.org/stable/1321160
[6]  California (2018) California Consumer Privacy Act CCPA. California Legislative Information, California Law, The Civil Code of California, CIV.
https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5
[7]  European-Union (2016) General Data Protection Regulation—GDPR. European Data Protection Supervisor—EDPS.
https://gdpr-info.eu/
[8]  Teixeira, G.A., da Silva, MM. and Pereira, R. (2019) The Critical Success Factors of GDPR Implementation: A Systematic Literature Review. Digital Policy, Regulation and Governance, 21, 402-418.
https://www.emerald.com/insight/content/doi/10.1108/DPRG-01-2019-0007/full/html
[9]  LGPD (2019) Brazil Data Protection Law. General Secretariat of the Presidency of the Republic Sub-Chief for Legal Affairs.
https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/l13709.htm#:~:text=1%C2%BA%20Esta%20Lei%20disp%C3%B5e%20sobre,da%20personalidade%20da%20pessoa%20natural
[10]  Sampigethaya, K., Li, M., Huang, L. and Poovendran, R. (2007) Amoeba: Robust Location Privacy Scheme for VANET. IEEE Journal on Selected Areas in Communications, 25, 1569-1589.
https://doi.org/10.1109/JSAC.2007.071007
[11]  Song, J.-H., Wong, V.W.S. and Leung, V.C.M. (2009) Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks. 2009 IEEE International Conference on Communications, Dresden, 14-18 June 2009, 1-6.
https://doi.org/10.1109/ICC.2009.5199575
[12]  Gedik, B. and Liu, L. (2007) Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing, 7, 1-18.
https://doi.org/10.1109/TMC.2007.1062
[13]  Lei, M., Qi, Z., Hong, X. and Vrbsky, S.V. (2007) Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. In 2007 IEEE Intelligence and Security Informatics, New Brunswick, 23-24 May 2007, 377-377.
https://doi.org/10.1109/ISI.2007.379513
[14]  Aman, M.N., Javaid, U. and Sikdar, B. (2021) A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet of Things Journal, 8, 1123-1139.
https://doi.org/10.1109/JIOT.2020.3010893
[15]  Julien, F., Raya, M., Felegyhazi, M. and Papadimitratos, P. (2007) Mix-Zones for Location Privacy in Vehicular Networks. In Association for Computing Machinery (ACM) Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS).
https://nss.proj.kth.se/publications/fulltext/location-privacy-mix-zones-vanet.pdf
[16]  Huang, L., Matsuura, K., Yamane, H. and Sezaki, K. (2005) Enhancing Wireless Location Privacy Using Silent Period. In IEEE Wireless Communications and Networking Conference, New Orleans, 13-17 March 2005, Vol. 2, 1187-1192.
https://doi.org/10.1109/WCNC.2005.1424677
[17]  Sheikh, M.S., Liang, J. and Wang, W. (2019) A Survey of Security Services, Attacks and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors, 19, 3589.
https://doi.org/10.3390/s19163589
[18]  Lo, N.-W. and Tsai, H.-C. (2007) Illusion Attack on VANET Applications—A Message Plausibility Problem. In 2007 IEEE Globecom Workshops, Washington, 26-30 November 2007, 1-8.
https://doi.org/10.1109/GLOCOMW.2007.4437823

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133