{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:36:41Z","timestamp":1760240201467,"version":"build-2065373602"},"reference-count":122,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T00:00:00Z","timestamp":1554249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase all over the world. One of the most significant enablers for ITS are vehicle positioning and tracking techniques. Worldwide integration of ITS employing Dedicated Short Range Communications (DSRC) and European standard for vehicular communication, known as ETSI ITS-G5, brings a variety of options to improve the positioning in areas where GPS connectivity is lacking precision. Utilization of the ready infrastructure, next-generation cellular 5G networks, and surrounding electronic devices together with conventional positioning techniques could become the solution to improve the overall ITS operation in vehicle-to-everything (V2X) communication scenario. Nonetheless, effective and secure communication protocols between the vehicle and roadside units should be both analyzed and improved in terms of potential attacks on the transmitted positioning-related data. In particular, said information might be misused or stolen at the infrastructure side conventionally assumed to be trusted. In this paper, we first survey different methods of vehicle positioning, which is followed by an overview of potential attacks on ITS systems. Next, we propose potential improvements allowing mutual authentication between the vehicle and infrastructure aiming at improving positioning data privacy. Finally, we propose a vision on the development and standardization aspects of such systems.<\/jats:p>","DOI":"10.3390\/s19071603","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T03:13:42Z","timestamp":1554347622000},"page":"1603","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3412-1639","authenticated-orcid":false,"given":"Aleksandr","family":"Ometov","sequence":"first","affiliation":[{"name":"Tampere University, 33720 Tampere, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0924-6221","authenticated-orcid":false,"given":"Sergey","family":"Bezzateev","sequence":"additional","affiliation":[{"name":"Saint-Petersburg State University of Aerospace Instrumentation (SUAI), St. Petersburg 190000, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5544-2434","authenticated-orcid":false,"given":"Vadim","family":"Davydov","sequence":"additional","affiliation":[{"name":"ITMO University, St. Petersburg 191002, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8008-9209","authenticated-orcid":false,"given":"Anna","family":"Shchesniak","sequence":"additional","affiliation":[{"name":"ITMO University, St. Petersburg 191002, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2976-6547","authenticated-orcid":false,"given":"Pavel","family":"Masek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, 60190 Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1718-6924","authenticated-orcid":false,"given":"Elena Simona","family":"Lohan","sequence":"additional","affiliation":[{"name":"Tampere University, 33720 Tampere, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3976-297X","authenticated-orcid":false,"given":"Yevgeni","family":"Koucheryavy","sequence":"additional","affiliation":[{"name":"Tampere University, 33720 Tampere, Finland"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MWC.2016.1500157RP","article-title":"Realizing the Tactile Internet: Haptic Communications over Next Generation 5G Cellular Networks","volume":"24","author":"Aijaz","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_2","unstructured":"Cisco (2019, April 01). Visual Networking Index: Global Mobile Data Traffic Forecast Update 2017\u20132022. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-738429.html."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2017.1600238CM","article-title":"UAV-enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges","volume":"55","author":"Menouar","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TMC.2016.2592915","article-title":"MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs","volume":"16","author":"Lin","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1600","DOI":"10.1109\/LCOMM.2018.2835484","article-title":"Modeling of V2V Communications for C-ITS Safety Applications: A CPS Perspective","volume":"22","author":"Vinel","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/TITS.2016.2580318","article-title":"Real-time Energy Management Strategy Based on Velocity Forecasts Using V2V and V2I Communications","volume":"18","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.trc.2016.03.008","article-title":"Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication in a Heterogeneous Wireless Network\u2013Performance Evaluation","volume":"68","author":"Dey","year":"2016","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"15800","DOI":"10.1109\/ACCESS.2017.2731777","article-title":"Latency of Cellular-based V2X: Perspectives on TTI-Proportional Latency and TTI-Independent Latency","volume":"5","author":"Lee","year":"2017","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2016.7497762","article-title":"LTE Evolution for Vehicle-to-Everything Services","volume":"54","author":"Seo","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"8338","DOI":"10.1109\/ACCESS.2016.2630708","article-title":"A DSRC-Based Vehicular Positioning Enhancement Using a Distributed Multiple-Model Kalman Filter","volume":"4","author":"Wang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"9457","DOI":"10.1109\/TVT.2016.2591558","article-title":"Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey","volume":"65","author":"Abboud","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","unstructured":"ETSI (2012). Intelligent Transport Systems (ITS); Access Layer Specification for Intelligent Transport Systems Operating in the 5 GHz Frequency Band, ETSI. Draft ETSI EN 302 663 V1.2.0."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Deinlein, T., German, R., and Djanatliev, A. (2018, January 26\u201328). Evaluation of Single-Hop Beaconing with Congestion Control in IEEE WAVE and ETSI ITS-G5. Proceedings of the International Conference on Measurement, Modelling and Evaluation of Computing Systems, Erlangen, Germany.","DOI":"10.1007\/978-3-319-74947-1_19"},{"key":"ref_14","unstructured":"FierceWireless (2019, April 01). DSRC Mandate Moving off the Table for Automakers. Available online: https:\/\/www.fiercewireless.com\/wireless\/report-dsrc-mandate-moving-off-table-for-auto-makers."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2834","DOI":"10.1109\/ACCESS.2017.2785443","article-title":"Method to Improve the Positioning Accuracy of Vehicular Nodes Using IEEE 802.11p Protocol","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","unstructured":"Engadget (2019, April 01). Most of Toyota\u2019s Cars Will Talk to Each Other by 2025. Available online: https:\/\/www.engadget.com\/2018\/04\/16\/toyota-vehicle-to-vehicle-communications\/."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1017\/S0373463312000082","article-title":"Multi-Constellation GNSS Performance Evaluation for Urban Canyons Using Large Virtual Reality City Models","volume":"65","author":"Wang","year":"2012","journal-title":"J. Navig."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/JIOT.2016.2593898","article-title":"Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things","volume":"4","author":"Ometov","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1086\/666376","article-title":"Access-based Consumption: The Case of Car Sharing","volume":"39","author":"Bardhi","year":"2012","journal-title":"J. Consum. Res."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Dmitrienko, A., and Plappert, C. (2017, January 22\u201324). Secure Free-floating Car Sharing for Offline Cars. Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA.","DOI":"10.1145\/3029806.3029807"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TRA.2002.807557","article-title":"Autonomous Vehicle Positioning with GPS in Urban Canyon Environments","volume":"19","author":"Cui","year":"2003","journal-title":"IEEE Trans. Robot. Autom."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wang, L., Groves, P.D., and Ziebart, M.K. (2013). Shadow Matching: Improving Smartphone GNSS Positioning in Urban Environments. China Satellite Navigation Conference (CSNC), Springer.","DOI":"10.1007\/978-3-642-37407-4_57"},{"key":"ref_23","unstructured":"Douglas, I.J. (2016). Improving GPS Global Navigation Accuracy for Connected Vehicles in an Urban Canyon. [Ph.D. Thesis, University of Windsor]."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"del Peral-Rosado, J., Saloranta, J., Destino, G., L\u00f3pez-Salcedo, J., and Seco-Granados, G. (2018). Methodology for Simulating 5G and GNSS High-Accuracy Positioning. Sensors, 18.","DOI":"10.3390\/s18103220"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kumar, D., Saloranta, J., Kaleva, J., Destino, G., and T\u00f6lli, A. (2018). Reliable Positioning and mmWave Communication via Multi-Point Connectivity. Sensors, 18.","DOI":"10.3390\/s18114001"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Soatti, G., Nicoli, M., Garcia, N., Denis, B., Raulefs, R., and Wymeersch, H. (arXiv, 2017). Implicit Cooperative Positioning in Vehicular Networks, arXiv.","DOI":"10.1109\/TITS.2018.2794405"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/COMST.2016.2544751","article-title":"A Survey on Mobile Anchor Node Assisted Localization in Wireless Sensor Networks","volume":"18","author":"Han","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mahmoud, A., Noureldin, A., and Hassanein, H.S. (2015, January 6\u20139). VANETs Positioning in Urban Environments: A Novel Cooperative Approach. Proceedings of the 82nd Vehicular Technology Conference (VTC Fall), Boston, MA, USA.","DOI":"10.1109\/VTCFall.2015.7391188"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Talvitie, J., Levanen, T., Koivisto, M., Pajukoski, K., Renfors, M., and Valkama, M. (arXiv, 2018). Positioning of High-speed Trains Using 5G New Radio Synchronization Signals, arXiv.","DOI":"10.1109\/WCNC.2018.8377225"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lohan, E.S., Al\u00e9n-Savikko, A., Chen, L., J\u00e4rvinen, K., Lepp\u00e4koski, H., Kuusniemi, H., and Korpisaari, P. (2018). 5G Positioning: Security and Privacy Aspects. A Comprehensive Guide to 5G Security, John Wiley & Sons Ltd.","DOI":"10.1002\/9781119293071.ch13"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V. (2017, January 13\u201315). Network Security Architectures for VANET. Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, India.","DOI":"10.1145\/3136825.3136890"},{"key":"ref_32","unstructured":"WIRED Media Group (2019, April 01). Website Leaked Real-time Location of Most US Cell Phones to Almost Anyone. Available online: https:\/\/arstechnica.com\/information-technology\/2018\/05\/service-leaked-locations-of-us-cell-phones-for-free-no-password-required\/."},{"key":"ref_33","unstructured":"The New York Times (2019, April 01). Service Meant to Monitor Inmates\u2019 Calls Could Track You, Too. Available online: https:\/\/www.nytimes.com\/2018\/05\/10\/technology\/cellphone-tracking-law-enforcement.html."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1038\/srep01376","article-title":"Unique in the Crowd: The Privacy Bounds of Human Mobility","volume":"3","author":"Hidalgo","year":"2013","journal-title":"Sci. Rep."},{"key":"ref_35","unstructured":"NBCUniversal Media (2019, April 01). Your Phone May Be Tracking Your Every Move. Available online: https:\/\/www.nbclosangeles.com\/news\/local\/Smartphone-Location-Tracking-423054644.html."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"24555","DOI":"10.1109\/ACCESS.2017.2767641","article-title":"A Study of Enhancing Privacy for Intelligent Transportation Systems: k-Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data","volume":"5","author":"Sui","year":"2017","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"e3081","DOI":"10.1002\/dac.3081","article-title":"A Secure Mutual Authentication Scheme with Non-Repudiation for Vehicular Ad Hoc Networks","volume":"30","author":"Chen","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2544","DOI":"10.1109\/TVT.2013.2296071","article-title":"Improving positioning accuracy using GPS pseudorange measurements for cooperative vehicular localization","volume":"63","author":"Liu","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Hegarty, C.J. (2017). The Global Positioning System (GPS). Springer Handbook of Global Navigation Satellite Systems, Springer.","DOI":"10.1007\/978-3-319-42928-1_7"},{"key":"ref_40","unstructured":"U.S. Coast Guard Navigation Center (2019, April 01). GPS Contallation Status, Available online: https:\/\/www.navcen.uscg.gov\/?Do=constellationStatus."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s00190-015-0802-8","article-title":"Accuracy and Reliability of Multi-GNSS Real-time Precise Positioning: GPS, GLONASS, BeiDou, and Galileo","volume":"89","author":"Li","year":"2015","journal-title":"J. Geod."},{"key":"ref_42","unstructured":"Information and Analysis Center for Positioning, Navigation and Timing (2019, April 01). GLONASS contallation Status. Available online: https:\/\/www.glonass-iac.ru\/en\/GLONASS\/."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Nurmi, J., Lohan, E.S., Sand, S., and Hurskainen, H. (2015). GALILEO Positioning Technology, Springer.","DOI":"10.1007\/978-94-007-1830-2"},{"key":"ref_44","unstructured":"European GNSS Service Center (2019, April 01). GALILEO Contallation Status. Available online: https:\/\/www.gsc-europa.eu\/system-status\/orbital-and-technical-parameters."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2899","DOI":"10.1007\/s11432-012-4724-2","article-title":"Research and Progress of Beidou Satellite Navigation System","volume":"55","author":"Sun","year":"2012","journal-title":"Sci. China Inf. Sci."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s40328-012-0010-4","article-title":"Performance Assessment of GPS\/GLONASS Single Point Positioning in an Urban Environment","volume":"48","author":"Angrisano","year":"2013","journal-title":"Acta Geod. Geophys."},{"key":"ref_47","unstructured":"Renfro, B.A., Terry, A., and Boeker, N. (2017). An Analysis of Global Positioning System (GPS) Standard Positioning System (SPS) Performance for 2015, Space and Geophysics Laboratory, Applied Research Laboratories, The University of Texas at Austin. Technical Report."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1515\/pomr-2015-0012","article-title":"Accuracy of the GPS Positioning System in the Context of Increasing the Number of Satellites in the Constellation","volume":"22","author":"Specht","year":"2015","journal-title":"Polish Marit. Res."},{"key":"ref_49","unstructured":"Meridian World Data, Inc. (2019, April 01). Distance Calculation. Available online: http:\/\/www.meridianworlddata.com\/distance-calculation\/."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Laitinen, E., Lohan, E.S., Talvitie, J., and Shrestha, S. (2012, January 15\u201316). Access Point Significance Measures in WLAN-based Location. Proceedings of the 9th Workshop on Positioning Navigation and Communication (WPNC), Dresden, Germany.","DOI":"10.1109\/WPNC.2012.6268733"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Ma, S., Lee, H., and Cheng, H. (2018, January 17\u201319). A Positioning Accuracy Enhancement Method Based on Inter-Vehicular Communication and Self-Organizing Map. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2018.8539580"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1007\/s10586-017-0764-0","article-title":"Recognizing Individuals in Groups in Outdoor Environments Combining Stereo Vision, RFID and BLE","volume":"20","author":"Llorca","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Lei, Y., Wang, T., and Wu, J. (2016, January 17\u201319). Vehicles Relative Positioning Based on ZigBee and GPS Technology. Proceedings of the 6th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China.","DOI":"10.1109\/ICEIEC.2016.7589687"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Sivers, M., and Fokin, G. (2015, January 26\u201328). LTE Positioning Accuracy Performance Evaluation. Proceedings of the Conference on Smart Spaces, St. Petersburg, Russia.","DOI":"10.1007\/978-3-319-23126-6_35"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Koivisto, M., Costa, M., Hakkarainen, A., Leppanen, K., and Valkama, M. (2016, January 4\u20138). Joint 3D Positioning and Network Synchronization in 5G Ultra-Dense Networks Using UKF and EKF. Proceedings of the Globecom Workshops (GC Wkshps), Washington, DC, USA.","DOI":"10.1109\/GLOCOMW.2016.7848938"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Halvarsson, B., Simonsson, A., Elgcrona, A., Chana, R., Machado, P., and Asplund, H. (2018, January 3\u20136). 5G NR Testbed 3.5 GHz Coverage Results. Proceedings of the 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417704"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Rastorgueva-Foi, E., Costa, M., Koivisto, M., Lepp\u00e4nen, K., and Valkama, M. (arXiv, 2018). User Positioning in mmW 5G Networks using Beam-RSRP Measurements and Kalman Filtering, arXiv.","DOI":"10.23919\/ICIF.2018.8455289"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/MNET.2017.1700066","article-title":"Prospective Positioning Architecture and Technologies in 5G Networks","volume":"31","author":"Liu","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MWC.2017.1600374","article-title":"5G mmWave Positioning for Vehicular Networks","volume":"24","author":"Wymeersch","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Wymeersch, H., Garcia, N., Kim, H., Seco-Granados, G., Kim, S., Went, F., and Fr\u00f6hle, M. (2018, January 9\u201313). 5G mm Wave Downlink Vehicular Positioning. Proceedings of the Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOM.2018.8647275"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","article-title":"Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles","volume":"19","author":"Kang","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Parker, R., and Valaee, S. (2006, January 25\u201328). Vehicle Localization in Vehicular Networks. Proceedings of the 64th Vehicular Technology Conference (VTC), Montreal, QC, Canada.","DOI":"10.1109\/VTCF.2006.557"},{"key":"ref_63","unstructured":"Capkun, S., and Hubaux, J.P. (2005, January 13\u201317). Secure Positioning of Wireless Devices with Application to Sensor Networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., and Maltz, D.A. (1996). Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Springer.","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/TITS.2002.802929","article-title":"Vehicle Control Algorithms for Cooperative Driving with Automated Vehicles and Intervehicle Communications","volume":"3","author":"Kato","year":"2002","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_66","unstructured":"Clark, S., and Durrant-Whyte, H. (1998, January 16\u201320). Autonomous Land Vehicle Navigation Using Millimeter Wave Radar. Proceedings of the International Conference on Robotics and Automation, Leuven, Belgium."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Yoneda, K., Hashimoto, N., Yanase, R., Aldibaja, M., and Suganuma, N. (2018, January 26\u201330). Vehicle Localization Using 76GHz Omnidirectional Millimeter-Wave Radar for Winter Automated Driving. Proceedings of the Intelligent Vehicles Symposium (IV), Changshu, China.","DOI":"10.1109\/IVS.2018.8500378"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.comcom.2015.10.002","article-title":"PrivHab+: A Secure Geographic Routing Protocol for DTN","volume":"78","author":"Robles","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_69","first-page":"7867206","article-title":"Extended Privacy in Crowdsourced Location-based Services Using Mobile Cloud Computing","volume":"2016","author":"Bourgeau","year":"2016","journal-title":"Mob. Inf. Syst."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., and Gerla, M. (arXiv, 2019). Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications, arXiv.","DOI":"10.1109\/MNET.2019.1800240"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"5520","DOI":"10.1109\/ACCESS.2016.2604360","article-title":"Real-time Positioning Based on Millimeter Wave Device to Device Communications","volume":"4","author":"Cui","year":"2016","journal-title":"IEEE Access"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2014.6807945","article-title":"An Overview of 3GPP Device-to-Device Proximity Services","volume":"52","author":"Lin","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Riener, A., and Ferscha, A. (2008, January 22\u201324). Supporting Implicit Human-to-Vehicle Interaction: Driver Identification from Sitting Postures. Proceedings of the 1st Annual International Symposium on Vehicular Computing Systems (ISVCS), Dublin, Ireland.","DOI":"10.4108\/ICST.ISVCS2008.3545"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1016\/j.promfg.2015.07.513","article-title":"A Review and Framework of Control Authority Transitions in Automated Driving","volume":"3","author":"Lu","year":"2015","journal-title":"Procedia Manuf."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Dunbar, J., and Gilbert, J.E. (2017, January 9\u201314). The Human Element in Autonomous Vehicles. Proceedings of the International Conference on Engineering Psychology and Cognitive Ergonomics, Vancouver, BC, Canada.","DOI":"10.1007\/978-3-319-58475-1_26"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"2315036","DOI":"10.1155\/2017\/2315036","article-title":"Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G","volume":"2017","author":"Campos","year":"2017","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_77","unstructured":"Esteves, J.S., Carvalho, A., and Couto, C. (2003, January 9\u201311). Generalized Geometric Triangulation Algorithm for Mobile Robot Absolute Self-localization. Proceedings of the IEEE International Symposium on Industrial Electronics, Rio de Janeiro, Brazil."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Larson, U.E., and Nilsson, D.K. (2008, January 12\u201314). Securing Vehicles Against Cyber Attacks. Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, Oak Ridge, TN, USA.","DOI":"10.1145\/1413140.1413174"},{"key":"ref_79","first-page":"546","article-title":"Potential Cyberattacks on Automated Vehicles","volume":"16","author":"Petit","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s11276-015-1005-1","article-title":"Vehicle Authentication via Monolithically Certified Public Key and Attributes","volume":"22","author":"Dolev","year":"2016","journal-title":"Wirel. Netw."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., and Ho, P.H. (2008, January 19\u201323). RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks. Proceedings of the International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.281"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P. (2018, January 4\u20137). Role-based Access Control for Vehicular adhoc Networks. Proceedings of the International Black Sea Conference on Communications and Networking (BlackSeaCom), Batumi, Georgia.","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/COMST.2017.2785181","article-title":"Survey of Cellular Mobile Radio Localization Methods: From 1G to 5G","volume":"20","author":"Raulefs","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Qian, C., Xu, H., Li, P., and Wang, Y. (2017, January 10\u201313). Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS. Proceedings of the Conference on Complex, Intelligent, and Software Intensive Systems, Turin, Italy.","DOI":"10.1007\/978-3-319-61566-0_55"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TITS.2015.2465141","article-title":"A Novel Approach for Improved Vehicular Positioning Using Cooperative Map Matching and Dynamic Base Station DGPS Concept","volume":"17","author":"Rohani","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","article-title":"The Security and Privacy of Smart Vehicles","volume":"2","author":"Hubaux","year":"2004","journal-title":"IEEE Secur. Priv."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Davydov, V., and Bezzateev, S. (2018, January 4\u20136). Secure Information Exchange in Defining the Location of the Vehicle. Proceedings of the 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece.","DOI":"10.1109\/TSP.2018.8441262"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient Fully Homomorphic Encryption from (Standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"ref_89","first-page":"32","article-title":"Location Privacy using Homomorphic Encryption over Cloud","volume":"9","author":"Rohilla","year":"2017","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Alanwar, A., Shoukry, Y., Chakraborty, S., Martin, P., Tabuada, P., and Srivastava, M. (2017, January 18\u201321). PrOLoc: Resilient Localization with Private Observers Using Partial Homomorphic Encryption. Proceedings of the 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Pittsburgh, PA, USA.","DOI":"10.1145\/3055031.3055080"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"012116","DOI":"10.1088\/1742-6596\/978\/1\/012116","article-title":"A Comparative Study of Message Digest 5 (MD5) and SHA256 Algorithm","volume":"978","author":"Rachmawati","year":"2018","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_92","unstructured":"Guerzhoy, M. (2019, April 01). Complexity of Aarithmetic Operations. Available online: https:\/\/www.cs.toronto.edu\/~guerzhoy\/180\/lectures\/W11\/lec1\/ComplArithm.html."},{"key":"ref_93","unstructured":"Montanaro, A., and Osborne, T. (arXiv, 2009). On the Communication Complexity of XOR Functions, arXiv."},{"key":"ref_94","first-page":"1192","article-title":"A Guide to Fully Homomorphic Encryption","volume":"2015","author":"Armknecht","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Ta, V.T., Dvir, A., and Arie, Y. (2018, January 12\u201315). Securing Road Traffic Congestion Detection by Incorporating V2I Communications. Proceedings of the 19th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece.","DOI":"10.1109\/WoWMoM.2018.8449746"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.S. (2012, January 12\u201314). Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs). Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, Australia.","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","article-title":"Secure Positioning in Wireless Networks","volume":"24","author":"Capkun","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","article-title":"Detecting Sybil Attacks in VANETs","volume":"73","author":"Yu","year":"2013","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_99","unstructured":"Li, X., Li, Z., Han, J., and Lee, J.G. (April, January 29). Temporal Outlier Detection in Vehicle Traffic Data. Proceedings of the 25th International Conference on Data Engineering, Shanghai, China."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","article-title":"Survey on Security Issues in Vehicular Ad Hoc Networks","volume":"54","author":"Mokhtar","year":"2015","journal-title":"Alex. Eng. J."},{"key":"ref_101","first-page":"21","article-title":"Security and Privacy in VANET to Reduce Authentication Overhead for Rapid Roaming Networks","volume":"1","author":"Mahajan","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","article-title":"GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications","volume":"56","author":"Lin","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","article-title":"Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges","volume":"50","author":"Zeadally","year":"2012","journal-title":"Telecommun. Syst."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Garip, M.T., Gursoy, M.E., Reiher, P., and Gerla, M. (2015, January 8). Congestion Attacks to Autonomous Cars Using Vehicular Botnets. Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, CA, USA.","DOI":"10.14722\/sent.2015.23001"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Smitha, A., Pai, M.M., Ajam, N., and Mouzna, J. (2013, January 14\u201316). An Optimized Adaptive Algorithm for Authentication of Safety Critical Messages in VANET. Proceedings of the 8th International Conference on Communications and Networking in China (CHINACOM), Guilin, China.","DOI":"10.1109\/ChinaCom.2013.6694582"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Alsharif, N., Wasef, A., and Shen, X. (2011, January 5\u20139). Mitigating the Effects of Position-based Routing Attacks in Vehicular Ad Hoc Networks. Proceedings of the International Conference on Communications (ICC), Kyoto, Japan.","DOI":"10.1109\/icc.2011.5962855"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Erritali, M., and El Ouahidi, B. (2013, January 26\u201327). A Review and Classification of Various VANET Intrusion Detection Systems. Proceedings of the National Security Days (JNS3), Rabat, Morocco.","DOI":"10.1109\/JNS3.2013.6595459"},{"key":"ref_108","first-page":"210","article-title":"An Analytical Study of Routing Attacks in Vehicular Ad-Hoc Networks (VANETs)","volume":"3","author":"Sirola","year":"2014","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_109","first-page":"7","article-title":"VANET Security Challenges and Solutions: A Survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Simic, M.N. (2013, January 16\u201319). Vehicular Ad Hoc Networks. Proceedings of the 11th International Conference on Telecommunication in Modern Satellite, Cable and Broadcasting Services (TELSIKS), Nis, Serbia.","DOI":"10.1109\/TELSKS.2013.6704453"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Bloessl, B., Sommer, C., Dressier, F., and Eckhoff, D. (2015, January 16\u201319). The Scrambler Attack: A Robust Physical Layer Attack on Location Privacy in Vehicular Networks. Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA.","DOI":"10.1109\/ICCNC.2015.7069376"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting Location Privacy with Personalized k-anonymity: Architecture and Algorithms","volume":"7","author":"Gedik","year":"2008","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TDSC.2015.2480699","article-title":"A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks","volume":"13","author":"Artail","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Gerlach, M., and Guttler, F. (2007, January 22\u201325). Privacy in VANETs Using Changing Pseudonyms-Ideal and Real. Proceedings of the 65th Vehicular Technology Conference, Dublin, Ireland.","DOI":"10.1109\/VETECS.2007.519"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Zegzhda, P., Zegzhda, D., Vasiliev, Y., and Belenko, V. (2016, January 19\u201321). Software Defined Security for Vehicular ad hoc Networks. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2016.7763528"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Di Maio, A., Palattella, M., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., and Engel, T. (2016). Enabling SDN in VANETs: What is the Impact on Security?. Sensors, 16.","DOI":"10.3390\/s16122077"},{"key":"#cr-split#-ref_117.1","unstructured":"European Parliament and Council of the European Union (2018). General Data Protection Regulation"},{"key":"#cr-split#-ref_117.2","unstructured":"(EU) 2016\/679 (\"GDPR\"), European Parliament and Council of the European Union. EU Regulation."},{"key":"ref_118","unstructured":"ETSI (2017). Satellite Earth Stations and Systems (SES); Global Navigation Satellite System (GNSS) Receivers; Radio Equipment Operating in the 1 164 MHz to 1 300 MHz and 1 559 MHz to 1 610 MHz Frequency Bands; Harmonised Standard Covering the Essential Requirements of Article 3.2 of Directive 2014\/53\/EU, ETSI. Draft ETSI EN 303 413 V1.1.0."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MSP.2014.2332611","article-title":"Location-aware Communications for 5G Networks","volume":"31","author":"Muppirisetty","year":"2014","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., and Gurtov, A. (2017, January 18\u201320). 5G Security: Analysis of Threats and Solutions. Proceedings of the Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland.","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"ref_121","unstructured":"Huawei (2019, April 01). 5G Security: Forward Thinking. Available online: https:\/\/www.huawei.com\/minisite\/5g\/img\/5G_Security_Whitepaper_en.pdf."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/7\/1603\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:42:34Z","timestamp":1760186554000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/7\/1603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,3]]},"references-count":122,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["s19071603"],"URL":"https:\/\/doi.org\/10.3390\/s19071603","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,4,3]]}}}