{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:48:12Z","timestamp":1762876092691,"version":"3.40.5"},"reference-count":35,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61262081"],"award-info":[{"award-number":["61262081"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61462056"],"award-info":[{"award-number":["61462056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662042"],"award-info":[{"award-number":["61662042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yunnan Provincial Key Project of Applied Basic Research Plan","award":["2014FA028"],"award-info":[{"award-number":["2014FA028"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p> In Internet of Vehicles, establishing swap zones in which vehicles can exchange pseudonyms is an effective method to enhance vehicles\u2019 location privacy. In this article, we propose a new scheme based on dynamic pseudonym swap zone, to protect location privacy of vehicles. For each vehicle, dynamic pseudonym swap zone allows it dynamically to establish a temporary pseudonym swap zone on demand to exchange the pseudonym with another random vehicle in the just formed zone. This randomness of choosing the pseudonym exchanging vehicles prevents dynamic pseudonym swap zone from the secure risk that the information of exchanging participants exposes to their group manager in some existing works in which each pair of pseudonym exchanging participants is assigned by the manager. To avoid the high communication and computation overhead of frequently swapping pseudonyms, dynamic pseudonym swap zone adopts a combination of swap and update to achieve the unlinkability between new and previous pseudonyms. Moreover, dynamic pseudonym swap zone can self-adapt to the varying surroundings to reduce the communication cost of forming pseudonym swap zones in high vehicle density areas. The analysis and simulation results show that our proposed dynamic pseudonym swap zone is a high location privacy preserving, secure, auditable scheme. <\/jats:p>","DOI":"10.1177\/1550147719865508","type":"journal-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T04:30:48Z","timestamp":1563856248000},"page":"155014771986550","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Location privacy preserving scheme based on dynamic pseudonym swap zone for Internet of Vehicles"],"prefix":"10.1177","volume":"15","author":[{"given":"Min","family":"Yang","sequence":"first","affiliation":[{"name":"Yunnan Key Laboratory of Computer Technology Applications, Kunming University of Science and Technology, Kunming, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0908-1623","authenticated-orcid":false,"given":"Yong","family":"Feng","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Computer Technology Applications, Kunming University of Science and Technology, Kunming, China"}]},{"given":"Xiaodong","family":"Fu","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Computer Technology Applications, Kunming University of Science and Technology, Kunming, China"}]},{"given":"Qian","family":"Qian","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Computer Technology Applications, Kunming University of Science and Technology, Kunming, China"}]}],"member":"179","published-online":{"date-parts":[[2019,7,23]]},"reference":[{"key":"bibr1-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.05.023"},{"key":"bibr2-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2319107"},{"key":"bibr3-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0403-3"},{"first-page":"197","volume-title":"Proceedings of the 9th international conference on mobile systems, applications, and services (Mobisys\u201911)","author":"Amini S","key":"bibr4-1550147719865508"},{"volume-title":"4th European conference on universal multiservice networks (ECUMN\u201907)","author":"Saleh Y","key":"bibr6-1550147719865508"},{"key":"bibr7-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0406-y"},{"key":"bibr8-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.020"},{"key":"bibr9-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.05.071"},{"key":"bibr10-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.070113.122816"},{"first-page":"7292","volume-title":"IEEE international conference on communications (ICC)","author":"Ying B","key":"bibr11-1550147719865508"},{"key":"bibr12-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"first-page":"174","volume-title":"Vehicular networking conference (VNC)","author":"Eckhoff D","key":"bibr13-1550147719865508"},{"issue":"10","key":"bibr14-1550147719865508","first-page":"3098","volume":"34","author":"Zhang B","year":"2017","journal-title":"Appl Res Comput"},{"key":"bibr15-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3704"},{"key":"bibr16-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4154-z"},{"issue":"2","key":"bibr17-1550147719865508","first-page":"1","volume":"95","author":"Arain QA","year":"2017","journal-title":"Wireless Pers Commun"},{"key":"bibr18-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3900-x"},{"first-page":"1","volume-title":"IEEE international conference on communications (ICC)","author":"Lu R","key":"bibr19-1550147719865508"},{"key":"bibr20-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"bibr21-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"first-page":"1","volume-title":"Vehicular networking conference (VNC)","author":"Butty\u00e1n L","key":"bibr22-1550147719865508"},{"key":"bibr23-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"first-page":"399","volume-title":"International conference on mathematics and computing","author":"Perera MNS","key":"bibr24-1550147719865508"},{"key":"bibr25-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2390497"},{"first-page":"37","volume-title":"Proceedings of the 8th international conference on trust, privacy and security in digital business (TrustBus\u201911)","author":"Scheuer F","key":"bibr27-1550147719865508"},{"key":"bibr28-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"bibr29-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3795"},{"first-page":"1","volume-title":"International conference on electronics and communication systems (ICECS)","author":"Mathews S","key":"bibr30-1550147719865508"},{"first-page":"19","volume-title":"Proceedings of the 2006 ACM workshop on privacy in the electronic society (WPES)","author":"Li M","key":"bibr31-1550147719865508"},{"key":"bibr32-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3437"},{"volume-title":"ACM SIGSAC conference on computer & communications security","author":"Araki T","key":"bibr33-1550147719865508"},{"key":"bibr34-1550147719865508","unstructured":"Buchmann JA. Introduction to cryptography. 2nd ed. New York: Springer Science and Business Media, 2013, pp.190\u2013191."},{"key":"bibr35-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1002\/nem.386"},{"key":"bibr36-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2841348"},{"key":"bibr37-1550147719865508","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1143-5"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719865508","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719865508","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719865508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T05:42:04Z","timestamp":1568958124000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719865508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":35,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,7,23]]},"published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1177\/1550147719865508"],"URL":"https:\/\/doi.org\/10.1177\/1550147719865508","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}