{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:03:43Z","timestamp":1746245023638,"version":"3.40.4"},"reference-count":40,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T00:00:00Z","timestamp":1397174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Location privacy protection in vehicular ad hoc networks considers preserving two types of information: the locations and identifications of users. However, existing solutions, which either replace identifications by pseudonyms or hide locations in areas, cannot be directly applied to geographic routing protocols because they degrade network performance. To address this issue, we proposed a location\u2010preserved contention (LPC) based routing protocol, in which greedy forwarding is achieved using dummy distance to the destination information instead of users\u2019 true locations. Unlike the contention\u2010based forwarding protocol, the number of duplicated responses in LPC can be reduced by adjusting the parameter<jats:italic>\u03b1<\/jats:italic>, which is a timer scaling factor. To quantify the efficiency of location privacy protection, an entropy\u2010based analytical method is proposed. LPC is compared with existing routing and location privacy protection protocols in simulations. Results show that LPC provides 11.7% better network performance and a higher level of location privacy protection than the second best protocol. Copyright \u00a9 2014 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1008","type":"journal-article","created":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T14:06:40Z","timestamp":1397225200000},"page":"886-898","source":"Crossref","is-referenced-by-count":2,"title":["Location\u2010preserved contention\u2010based routing in vehicular ad hoc networks"],"prefix":"10.1002","volume":"9","author":[{"given":"Qing","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Computer Science Montana State University Bozeman, MT 59717 U.S.A."}]},{"given":"Alvin","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering Auburn University Auburn, AL 36849 U.S.A."}]},{"given":"Xiaojun","family":"Ruan","sequence":"additional","affiliation":[{"name":"Department of Computer Science West Chester University of Pennsylvania West Chester, PA 19383 U.S.A."}]},{"given":"Xiao","family":"Qin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering Auburn University Auburn, AL 36849 U.S.A."}]},{"given":"Dongjin","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering Auburn University Auburn, AL 36849 U.S.A."}]}],"member":"311","published-online":{"date-parts":[[2014,4,11]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.070113.122816"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.101"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_8_7_1","doi-asserted-by":"crossref","unstructured":"KidoH YanagisawaY SatohT.Protection of location privacy using dummies for location\u2010based services 21st International Conference on Data Engineering Workshops 2005 Washington DC USA 2005;1248\u20131248.","DOI":"10.1109\/ICDE.2005.269"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","unstructured":"LuH JensenCS YiuML.PAD: privacy\u2010area aware dummy\u2010based location privacy in mobile services Proceedings of the 7th International ACM Workshop on Data Engineering for Wireless and Mobile Access Vancouver Canada 2008;16\u201323.","DOI":"10.1145\/1626536.1626540"},{"key":"e_1_2_8_9_1","doi-asserted-by":"crossref","unstructured":"SchochE KarglF LeinmullerT SchlottS PapadimitratosP.Impact of pseudonym changes on geographic routing in VANETs Third European Workshop on Security and Privacy in ad hoc and Sensor Networks (ESAS 2006) Hamburg Germany 2006;43\u201357.","DOI":"10.1007\/11964254_6"},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","unstructured":"KarpB KungHT.GPSR: greedy perimeter stateless routing for wireless networks Mobicom \u201900: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking Boston Massachusetts USA 2000;243\u2013254.","DOI":"10.1145\/345910.345953"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00038-6"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0169-2"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055959.1055970"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"CostaP FreyD MigliavaccaM MottolaL.Towards lightweight information dissemination in inter\u2010vehicular networks Vanet \u201906: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks Los Angeles CA USA 2006;20\u201329.","DOI":"10.1145\/1161064.1161069"},{"key":"e_1_2_8_15_1","doi-asserted-by":"crossref","unstructured":"ZhaoJ CaoG.VADD: vehicle\u2010assisted data delivery in vehicular ad hoc networks Proceedings of the 25th IEEE International Conference on Computer Communications. INFOCOM 2006 Barcelona Spain 2006;1\u201312.","DOI":"10.1109\/INFOCOM.2006.298"},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"MoZ ZhuH MakkiK PissinouN.MURU: a multi\u2010hop routing protocol for urban vehicular ad hoc networks 3rd Annual International conference on Mobile and Ubiquitous Systems \u2010 Workshops 2006 San Jose CA 2006;1\u20138.","DOI":"10.1109\/MOBIQW.2006.361738"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","unstructured":"NaumovV GrossTR.Connectivity\u2010aware routing (CAR) in vehicular ad\u2010hoc networks Proceedings of the 26th IEEE International Conference on Computer Communications Anchorage AK USA 2007;1919\u20131927.","DOI":"10.1109\/INFCOM.2007.223"},{"key":"e_1_2_8_18_1","doi-asserted-by":"crossref","unstructured":"LiT LiY LiaoJ.A contention\u2010based routing protocol for vehicular ad hoc networks in city environments 29th IEEE International Conference on Distributed Computing Systems Workshops 2009. ICDCS Workshops \u201909 Montreal QC Canada 2009;482\u2013487.","DOI":"10.1109\/ICDCSW.2009.52"},{"key":"e_1_2_8_19_1","doi-asserted-by":"crossref","unstructured":"KorkmazG EkiciE \u00d6zg\u00fcnerF \u00d6zg\u00fcnerU.Urban multi\u2010hop broadcast protocol for inter\u2010vehicle communication systems Proceedings of the 1st ACM International Workshop on Vehicular ad hoc Networks VANET \u201904 Philadelphia PA USA 2004;76\u201385.","DOI":"10.1145\/1023875.1023887"},{"key":"e_1_2_8_20_1","unstructured":"ChenD DengJ VarshneyPK.On the forwarding area of contention\u2010based geographic forwarding for ad hoc and sensor networks Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks Santa Clara California USA 2005;130\u2013141."},{"key":"e_1_2_8_21_1","doi-asserted-by":"crossref","unstructured":"RaoA RatnasamyS PapadimitriouC ShenkerS StoicaI.Geographic routing without location information Mobicom \u201903 ACM New York NY USA 2003;96\u2013108.","DOI":"10.1145\/938994.938996"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"RayaM HubauxJ\u2010P.The security of vehicular ad hoc networks Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks SASN \u201905 Alexandria VA USA 2005;11\u201321.","DOI":"10.1145\/1102219.1102223"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"key":"e_1_2_8_25_1","doi-asserted-by":"crossref","unstructured":"D\u00f6tzerF.Privacy issues in vehicular ad hoc networks Privacy Enhancing Technologies Cavtat Croatia 2005;197\u2013209.","DOI":"10.1007\/11767831_13"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"LuR LinX ZhuH HoP\u2010H ShenX.ECPP: efficient conditional privacy preservation protocol for secure vehicular communications The 27th Conference on Computer Communications. IEEE INFOCOM 2008 Phoenix AZ USA 2008;1229\u20131237.","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"e_1_2_8_27_1","unstructured":"SampigethayaK HuangL LiM PoovendranR MatsuuraK SezakiK.CARAVAN: providing location privacy for VANET Proceedings of Embedded Security in Cars (ESCAR) Cologne Germany 2005."},{"key":"e_1_2_8_28_1","unstructured":"FreudigerJ RayaM FlegyhziM PapadimitratosP HubauxJP.Mix\u2010zones for location privacy in vehicular networks ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN\u2010ITS) Vancouver BC Canada 2007."},{"key":"e_1_2_8_29_1","doi-asserted-by":"crossref","unstructured":"GerlachM GuttlerF.Privacy in VANETs using changing pseudonyms\u2014ideal and real IEEE 65th Vehicular Technology Conference 2007 Dublin Ireland 2007;2521\u20132525.","DOI":"10.1109\/VETECS.2007.519"},{"key":"e_1_2_8_30_1","doi-asserted-by":"crossref","unstructured":"PanY LiJ FengL XuB.An analytical model for random changing pseudonyms scheme in VANETs International Conference on Network Computing and Information Security (NCIS) 2011 Vol. 2 Guilin China 2011;141\u2013145.","DOI":"10.1109\/NCIS.2011.127"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0175-4"},{"key":"e_1_2_8_32_1","doi-asserted-by":"crossref","unstructured":"MehtaK LiuD WrightM.Location privacy in sensor networks against a global eavesdropper IEEE International Conference on Network Protocols 2007. ICNP 2007 Beijing China 2007;314\u2013323.","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_2_8_34_1","unstructured":"GerdesRM DanielsTE MinaM RussellSF.Device identification via analog signal fingerprinting: a matched filter approach Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS \u201906) San Diego California USA 2006."},{"key":"e_1_2_8_35_1","doi-asserted-by":"crossref","unstructured":"BrikV BanerjeeS GruteserM OhS.Wireless device identification with radiometric signatures Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom \u201908 2008;116\u2013127.","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-007-9375-z"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1002"},{"key":"e_1_2_8_38_1","doi-asserted-by":"crossref","unstructured":"DesmondLCC YuanCC PhengTC LeeRS.Identifying unique devices through wireless fingerprinting Proceedings of the first ACM conference on Wireless Network Security WiSec \u201908 ACM New York NY USA 2008;46\u201355.","DOI":"10.1145\/1352533.1352542"},{"key":"e_1_2_8_39_1","doi-asserted-by":"crossref","unstructured":"NiculescuD NathB.Ad hoc positioning system (APS) using AOA Twenty\u2010Second Annual Joint Conference of the IEEE Computer and Communications San Francisco CA USA 2003;1734\u20131743.","DOI":"10.1109\/INFCOM.2003.1209196"},{"key":"e_1_2_8_40_1","doi-asserted-by":"crossref","unstructured":"HoeneC WillmannJ.Four\u2010way TOA and software\u2010based trilateration of IEEE 802.11 devices IEEE 19th International Symposium on Personal Indoor and Mobile Radio Communications Cannes France 2008;1\u20136.","DOI":"10.1109\/PIMRC.2008.4699394"},{"key":"e_1_2_8_41_1","doi-asserted-by":"crossref","unstructured":"H\u00e4rriJ FilaliF BonnetC FioreM.VanetMobiSim: generating realistic mobility patterns for VANETs Vanet \u201906: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks ACM Press Los Angeles CA USA 2006;96\u201397.","DOI":"10.1145\/1161064.1161084"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1008","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T10:18:35Z","timestamp":1746181115000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,11]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1002\/sec.1008"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1002\/sec.1008","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2014,4,11]]}}}