{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T07:17:52Z","timestamp":1773731872643,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T00:00:00Z","timestamp":1651708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52130403"],"award-info":[{"award-number":["52130403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["N2017003"],"award-info":[{"award-number":["N2017003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities","award":["52130403"],"award-info":[{"award-number":["52130403"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["N2017003"],"award-info":[{"award-number":["N2017003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In vehicular ad hoc networks (VANETs), pseudonym change is considered as the vital mechanism to support vehicles\u2019 anonymity. Due to the complicated road conditions and network environment, it is a challenge to design an efficient and adaptive pseudonym change protocol. In this paper, a pseudonym change protocol for location privacy preserving (PCP) is proposed. We first present the requirements of pseudonym change in different scenarios. According to variable network states and road conditions, vehicles are able to take different pseudonym change strategies to resist the tracking by global passive adversaries. Furthermore, the registration protocol, authentication protocol, pseudonym issuance protocol, and pseudonym revocation protocol are introduced for the pseudonym management mechanism. As a consequence, it is not feasible for global passive adversaries to track a vehicle for a long time and obtain the trajectory of the vehicle. The analysis results show that the security and performance of PCP are improved compared with the traditional ones.<\/jats:p>","DOI":"10.3390\/e24050648","type":"journal-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T13:10:26Z","timestamp":1651756226000},"page":"648","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1865-2210","authenticated-orcid":false,"given":"Xinyang","family":"Deng","sequence":"first","affiliation":[{"name":"Software College, Northeastern University, Shenyang 110819, China"}]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, Shenyang 110819, China"}]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering College, Northeastern University, Shenyang 110819, China"}]},{"given":"Cong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, Shenyang 110819, China"}]},{"given":"Jiayu","family":"Qi","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, Shenyang 110819, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1109\/TITS.2011.2158001","article-title":"Data-Driven Intelligent Transportation Systems: A Survey","volume":"12","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1109\/SURV.2011.061411.00019","article-title":"Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions","volume":"13","author":"Karagiannis","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","unstructured":"(2019). IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture (Standard No. IEEE Std 1609.0-2019 (Revision of IEEE Std 1609.0-2013))."},{"key":"ref_4","first-page":"100278","article-title":"Analysis of mobility speed impact on end-to-end communication performance in VANETs","volume":"26","author":"Rehman","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Obaidat, M., Shahwan, I., Hassebo, A., Obeidat, S., Ali, M., and Khodjaeva, M. (2020). SNR-Based Early Warning Message Scheme for VANETs. J. Mob. Multimed., 162\u2013190.","DOI":"10.13052\/jmm1550-4646.1532"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4269","DOI":"10.1109\/TITS.2019.2939378","article-title":"A Novel Hybrid MAC Protocol for Basic Safety Message Broadcasting in Vehicular Networks","volume":"21","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_7","unstructured":"(2020). IEEE Standard for Wireless Access in Vehicular Environments (WAVE)\u2013Certificate Management Interfaces for End Entities (Standard No. IEEE Std 1609.2.1-2020)."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/COMST.2017.2771522","article-title":"A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks","volume":"20","author":"Boualouache","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","first-page":"102618","article-title":"Pseudonym change-based privacy preserving schemes in vehicular ad-hoc networks: A survey","volume":"55","author":"Babaghayou","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_10","unstructured":"Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., and Hubaux, J.-P. (2007, January 14). Mix-zones for location privacy in vehicular networks. Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, BC, Canada."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","article-title":"(Sherman) Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs","volume":"61","author":"Lu","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.procs.2016.04.198","article-title":"VLPZ: The vehicular location privacy zone","volume":"83","author":"Boualouache","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","article-title":"Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles","volume":"19","author":"Kang","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11789","DOI":"10.1109\/JIOT.2020.3001381","article-title":"PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.comcom.2017.09.005","article-title":"LIAP: A local identity-based anonymous message authentication protocol in VANETs","volume":"112","author":"Wang","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_16","unstructured":"Huang, L., Matsuura, K., Yamane, H., and Sezaki, K. (2005, January 13\u201317). Enhancing wireless location privacy using silent period. Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA."},{"key":"ref_17","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., and Sezaki, K. (2005). CARAVAN: Providing Location Privacy for VANET, Washington Univ Seattle Dept of Electrical Engineering. Tech. Rep."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Benarous, L., Kadri, B., and Boudjit, S. (2020, January 10\u201313). Alloyed Pseudonym Change Strategy for Location Privacy in VANETs. Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC46108.2020.9045740"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Eckhoff, D., Sommer, C., Gansen, T., German, R., and Dressler, F. (2010, January 13\u201315). Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. Proceedings of the 2010 IEEE Vehicular Networking Conference, Jersey City, NJ, USA.","DOI":"10.1109\/VNC.2010.5698239"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Holczer, T., Weimerskirch, A., and Whyte, W. (2009, January 28\u201330). SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan.","DOI":"10.1109\/VNC.2009.5416380"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1599","DOI":"10.1016\/j.jnca.2013.02.003","article-title":"Cooperative pseudonym change scheme based on the number of neighbors in VANETs","volume":"36","author":"Pan","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TDSC.2015.2399291","article-title":"MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks","volume":"13","author":"Yu","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_24","first-page":"100183","article-title":"CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs","volume":"20","author":"Singh","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_25","first-page":"100335","article-title":"A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET","volume":"29","author":"Soleymani","year":"2021","journal-title":"Veh. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3198","DOI":"10.1007\/s12083-021-01079-5","article-title":"A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks","volume":"14","author":"Chaudhary","year":"2021","journal-title":"Peer-Netw. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (2001). \u201cIdentity-Based Encryption from the Weil Pairing\u201d in CRYPTO 2001, Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref_28","unstructured":"Cha, J.C., and Cheon, J.H. (2003). An Identity-Based Signature from Gap Diffie\u2013Hellman Groups. International Workshop on Practice and Theory in Public Key Cryptography, Springer."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"20632","DOI":"10.1109\/ACCESS.2018.2809426","article-title":"An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain","volume":"6","author":"Lin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated short-range communications (DSRC) standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc. IEEE"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Obaidat, M., Khodjaeva, M., Holst, J., and Ben Zid, M. (2020). Security and Privacy Challenges in Vehicular Ad Hoc Networks. Connected Vehicles in the Internet of Things: Concepts, Technologies, and Frameworks for the IoV, Springer.","DOI":"10.1007\/978-3-030-36167-9_9"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G., Kaminsky, M., and Mitzenmacher, M.D. (2014, January 2\u20135). Cuckoo filter: Practically better than bloom. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Sydney, Australia.","DOI":"10.1145\/2674005.2674994"},{"key":"ref_33","unstructured":"Boyen, X., and Martin, L. (2021, December 07). Identity-Based Cryptography Standard (IBCS) \u266f1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems. Document RFC 5091. Available online: http:\/\/www.rfc.fr\/rfc\/en\/rfc5091.pdf."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","article-title":"Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis","volume":"10","author":"Sommer","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_35","unstructured":"Lynn, B., Shacham, H., Steiner, M., Cooley, J., Figueiredo, R., Khazan, R., Kosolapov, D., Bethencourt, J., and Miller, P. (2022, January 05). The Pairing-Based Cryptography Library. Available online: https:\/\/crypto.stanford.edu\/pbc\/times.html."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2008.80","article-title":"OpenStreetMap: User-generated street maps","volume":"7","author":"Haklay","year":"2008","journal-title":"IEEE Perva-Sive Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TDSC.2012.85","article-title":"Non-Cooperative Location Privacy","volume":"10","author":"Freudiger","year":"2013","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_38","unstructured":"(2019). IEEE Standard for Wireless Access in Vehicular Environments (WAVE)\u2013Multi-Channel Operation\u2014Corrigendum 1: Miscellaneous Corrections (Standard No. IEEE Std 1609.4-2016\/Cor 1-2019 (Corrigendum to IEEE Std 1609.4-2016))."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"8647","DOI":"10.1109\/TVT.2018.2839979","article-title":"Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs","volume":"67","author":"Tangade","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.jss.2012.09.015","article-title":"SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks","volume":"86","author":"Chuang","year":"2013","journal-title":"J. Syst. Softw."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/648\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:06:24Z","timestamp":1760137584000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,5]]},"references-count":41,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["e24050648"],"URL":"https:\/\/doi.org\/10.3390\/e24050648","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,5]]}}}