{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:23:46Z","timestamp":1742927026837,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246685"},{"type":"electronic","value":"9783642246692"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24669-2_8","type":"book-chapter","created":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T14:05:36Z","timestamp":1319292336000},"page":"74-88","source":"Crossref","is-referenced-by-count":2,"title":["A Survey on Privacy Problems and Solutions for VANET Based on Network Model"],"prefix":"10.1007","author":[{"given":"Hun-Jung","family":"Lim","sequence":"first","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"IDs\u2013not that easy: Questions about nationwide identity systems","author":"S.T. Kent","year":"2002","unstructured":"Kent, S.T., Millett, L.I.: IDs\u2013not that easy: Questions about nationwide identity systems. Natl. Academy Pr., Washington DC (2002)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2005","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2005)","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR3","unstructured":"Fuentes, J.M., Gonz\u00e1lez-Tablas, A.I., Ribagorda, A.: Overview of Security Issues in Vehicular Ad-Hoc Networks (2010)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11036-005-6425-1","volume":"10","author":"M. Gruteser","year":"2005","unstructured":"Gruteser, M., Grunwald, D.: Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks and Applications\u00a010, 315\u2013325 (2005)","journal-title":"Mobile Networks and Applications"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/WCNC.2005.1424677","volume-title":"IEEE Wireless Communications and Networking Conference, 2005","author":"L. Huang","year":"2005","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, 2005, vol.\u00a02, pp. 1187\u20131192. IEEE, Los Alamitos (2005)"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1145\/1247660.1247689","volume-title":"Proceedings of the 5th International Conference on Mobile Systems, Applications and Services","author":"T. Jiang","year":"2007","unstructured":"Jiang, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless LANs. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 246\u2013257. ACM, New York (2007)"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/1287853.1287866","volume-title":"Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking","author":"J. Pang","year":"2007","unstructured":"Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, pp. 99\u2013110. ACM, New York (2007)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 17\u201320. Citeseer (June 2008)","DOI":"10.1145\/1378600.1378607"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Droms, R.: Dynamic host configuration protocol (1997)","DOI":"10.17487\/rfc2131"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Holdrege, M.: RFC 2663. IP Network Address Translator (NAT) Terminology and Considerations (1999)","DOI":"10.17487\/rfc2663"},{"key":"8_CR11","unstructured":"Thomson, S., Narten, T., Jinmei, T.: RFC4862: IPv6 Stateless Address Autoconfiguration. Standards Track, http:\/\/www.ietf.org\/rfc\/rfc4862.txt AUTOCONF-Stating the Problem, 31"},{"key":"8_CR12","unstructured":"Haddad, W., Nordmark, E., Dupontand, F., Bagnulo, M., Park, S., Patil, B.: Privacy for Mobile and Multi-homed Nodes: MoMiPriv Problem Statement (2005)"},{"key":"8_CR13","first-page":"1","volume-title":"Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research","author":"S. Groat","year":"2010","unstructured":"Groat, S., Dunlop, M., Marchany, R., Tront, J.: The privacy implications of stateless IPv6 addressing. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134. ACM, New York (2010)"},{"key":"8_CR14","unstructured":"Lindqvist, J.: IPv6 is Bad for Your Privacy (2007)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/11423409_10","volume-title":"Privacy Enhancing Technologies","author":"J. Trostle","year":"2005","unstructured":"Trostle, J., Matsuoka, H., Tariq, M.M.B., Kempf, J., Kawahara, T., Jain, R.: Cryptographically protected prefixes for location privacy in ipv6. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 142\u2013166. Springer, Heidelberg (2005)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R., Krishnan, S.: RFC 4941-Privacy Extensions for Stateless Address Autoconfiguration in IPv6. IETF (September 2007)","DOI":"10.17487\/rfc4941"},{"key":"8_CR17","unstructured":"Nikander, P., Arkko, J., Kempf, J., Zill, B.: SEcure Neighbor Discovery (SEND)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: Dynamic host configuration protocol for IPv6 (DHCPv6) (2003)","DOI":"10.17487\/rfc3315"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Koodli, R.: RFC 4882: IP Address Location Privacy and Mobile IPv6: Problem Statement (2007)","DOI":"10.17487\/rfc4882"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Qiu, Y.: RFC 5726 : Mobile IPv6 Location Privacy Solutions (2010)","DOI":"10.17487\/rfc5726"},{"key":"8_CR21","unstructured":"Geographic Location\/Privacy (geopriv), http:\/\/datatracker.ietf.org\/wg\/geopriv\/"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/PERCOMW.2004.1276918","volume-title":"Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004","author":"A.R. Beresford","year":"2004","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 127\u2013131. IEEE, Los Alamitos (2004)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11767831_5","volume-title":"Privacy Enhancing Technologies","author":"L. Huang","year":"2006","unstructured":"Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 59\u201377. Springer, Heidelberg (2006)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/11734666_13","volume-title":"Security in Pervasive Computing","author":"L. Huang","year":"2006","unstructured":"Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent Cascade: Enhancing Location Privacy without Communication Qos Degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 165\u2013180. Springer, Heidelberg (2006)"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1179601.1179605","volume-title":"Proceedings of the 5th ACM Workshop on Privacy in Electronic Society","author":"M. Li","year":"2006","unstructured":"Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 19\u201328. ACM, New York (2006)"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1102219.1102223","volume-title":"Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"M. Raya","year":"2005","unstructured":"Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11\u201321. ACM, New York (2005)"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1109\/VETECS.2007.519","volume-title":"IEEE 65th Vehicular Technology Conference, VTC 2007-Spring","author":"M. Gerlach","year":"2007","unstructured":"Gerlach, M., Guttler, F.: Privacy in VANETs using changing pseudonyms-ideal and real. In: IEEE 65th Vehicular Technology Conference, VTC 2007-Spring, pp. 2521\u20132525. IEEE, Los Alamitos (2007)"},{"key":"8_CR28","unstructured":"Gerlach, M.: Assessing and Improving Privacy in VANETs. ESCAR, Embedded Security in Cars (2006)"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-73275-4_10","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Butty\u00e1n","year":"2007","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 129\u2013141. Springer, Heidelberg (2007)"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11767831_13","volume-title":"Privacy Enhancing Technologies","author":"F. D\u00f6tzer","year":"2006","unstructured":"D\u00f6tzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 197\u2013209. Springer, Heidelberg (2006)"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1023875.1023881","volume-title":"Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks","author":"P. Golle","year":"2004","unstructured":"Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29\u201337. ACM, New York (2004)"},{"key":"8_CR32","unstructured":"Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007) (2007)"},{"key":"8_CR33","first-page":"1","volume-title":"2009 IEEE Vehicular Networking Conference (VNC)","author":"L. Butty\u00e1n","year":"2010","unstructured":"Butty\u00e1n, L., Holczer, T., Weimerskirch, A., Whyte, W.: Slow: A practical pseudonym changing scheme for location privacy in vanets. In: 2009 IEEE Vehicular Networking Conference (VNC), pp. 1\u20138. IEEE, Los Alamitos (2010)"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-15497-3_4","volume-title":"Computer Security \u2013 ESORICS 2010","author":"M. Dahl","year":"2010","unstructured":"Dahl, M., Delaune, S., Steel, G.: Formal Analysis of Privacy for Vehicular Mix-Zones. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 55\u201370. Springer, Heidelberg (2010)"},{"key":"8_CR35","unstructured":"Poovendran, R., Sampigethaya, K., Huang, L., Li, M., Matsuura, K., Sezaki, K.: CARAVAN: Providing Location Privacy for VANET (2005)"},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K. Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust Location Privacy Scheme for Vanet. IEEE Journal on Selected Areas in Communications\u00a025, 1569\u20131589 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ITST.2007.4295890","volume-title":"7th International Conference on ITS Telecommunications, ITST 2007","author":"P. Papadimitratos","year":"2007","unstructured":"Papadimitratos, P., Buttyan, L., Hubaux, J.P., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: 7th International Conference on ITS Telecommunications, ITST 2007, pp. 1\u20136. IEEE, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24669-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,12]],"date-time":"2021-12-12T08:30:59Z","timestamp":1639297859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24669-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246685","9783642246692"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24669-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}