Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities

Journal article


Ullah, I., Shah, M. A., Khan, A. and Guizani, M. 2025. Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities. ACM Computing Surveys. 57 (6), pp. 1-44. https://doi.org/10.1145/3711681
AuthorsUllah, I., Shah, M. A., Khan, A. and Guizani, M.
Abstract

Vehicular networks (VANETs) revolutionized the world with smart traffic management, utilizing a road environment, and providing safety and convenience to the vehicle driver. Despite the useful features of vehicular networks, there are some privacy issues, which hinder their way toward achieving a smart world. Location privacy is one of the critical research challenges for the efficient deployment of VANETs. This challenge can be solved using a pseudonym instead of an actual vehicle identity in the beacon messages. For this purpose, many location privacy schemes are introduced in the literature. In this paper, we thoroughly review the existing location privacy schemes and present their comprehensive taxonomy. We discuss the design challenges for the development of an efficient location privacy scheme. Moreover, the existing location privacy techniques are critically analyzed based on diverse road network environments and parameters. Various issues and challenges regarding the pseudonym-changing process are elaborated in detail. Finally, we discuss the future trends for the implementation of location privacy in a vehicular network.

KeywordsVANETs; location privacy; pseudonym; mix zone; silent period; group signature; path perturbation; anonymous authentication
Year2025
JournalACM Computing Surveys
Journal citation57 (6), pp. 1-44
PublisherACM
ISSN0360-0300
Digital Object Identifier (DOI)https://doi.org/10.1145/3711681
Web address (URL)https://dl.acm.org/doi/10.1145/3711681#:~:text=Location%20privacy%20is%20one%20of,are%20introduced%20in%20the%20literature.
Accepted author manuscript
License
File Access Level
Open
Output statusPublished
Publication dates
Online10 Feb 2025
Publication process dates
Accepted24 Dec 2024
Deposited04 Mar 2025
Permalink -

https://repository.derby.ac.uk/item/qwv93/location-privacy-schemes-in-vehicular-networks-taxonomy-comparative-analysis-design-challenges-and-future-opportunities

Download files


Accepted author manuscript
Revised-Location Privacy in VANETs (Ikram) ACM format.pdf
License: CC BY 4.0
File access level: Open

  • 2
    total views
  • 7
    total downloads
  • 2
    views this month
  • 7
    downloads this month

Export as

Related outputs

Hybrid Non-Technical-Loss Detection in Fog-enabled Smart Grids
Khan, H. M., Jabeen, F., Khan, A., Badawi, S. A., Maple, C. and Jeon, G. 2024. Hybrid Non-Technical-Loss Detection in Fog-enabled Smart Grids. Sustainable Energy Technologies and Assessments. 65, pp. 1-9. https://doi.org/10.1016/j.seta.2024.103775
Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function
Nawaz, I., Ali Shah, M., Khan, A. and Jeon, S. 2024. Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function. Wireless Networks. pp. 1-16. https://doi.org/10.1007/s11276-024-03651-2
A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA
Gilani, S. Y., Anjum, A., Khan, A., Khan, A., Syed, M. H., Moqurrab, S. A. and Srivastava, G. 2024. A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA. Internet of Things. pp. 1-21. https://doi.org/10.1016/j.iot.2024.101066
Improved angelization technique against background knowledge attack for 1:M microdata
Fazal, R., Khan, R., Anjum, A., Syed, M. H., Khan, A. and Rehman, S. 2023. Improved angelization technique against background knowledge attack for 1:M microdata. PeerJ. https://doi.org/10.7717/peerj-cs.1255
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs
Zafar, W. U. I., Rehman, M. A. U., Jabeen, F., Ullah, R., Abbas, G. and Khan, A. 2023. Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs. Computer Networks. 236, pp. 1-23. https://doi.org/10.1016/j.comnet.2023.109996
A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy
Batool, H., Anjum, A., Khan, A., Izzo, S., Mazzocca, C. and Jeon, G. 2023. A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy. Elsevier Information Sciences. 652. https://doi.org/10.1016/j.ins.2023.119717
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning
Sikandar, H. S., Malik, S. R., Anjum, A., Khan, A. and Jeon, G. 2023. Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Generation Computer Systems. 149, pp. 518-530. https://doi.org/10.1016/j.future.2023.07.037
An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids
Mahmood, A., Khan, A., Anjum, A., Maple, C. and Jeon, G. 2023. An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids. Sustainable Energy Technologies and Assessments. 60, pp. 1-11. https://doi.org/10.1016/j.seta.2023.103414
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions
Mansoor Ahmed (PhD), Amil Dar, Markus Helfert, Khan, A. and Jungsuk Kim 2023. Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors. 23 (14), pp. 1-26. https://doi.org/10.3390/s23146495
Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger
Iftikhar, Z., Anjum, A., Jeon, G., Shah, M. A. and Khan, A. 2023. Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger. Springer Cluster Computing . pp. 1-17. https://doi.org/10.1007/s10586-023-04002-0
A Privacy-Enabled, Blockchain-Based Smart Marketplace
Bello Musa Yakubu, Majid Iqbal Khan, Khan, A., Adeel Anjum, Madiha Syed and Semeen Rehman 2023. A Privacy-Enabled, Blockchain-Based Smart Marketplace. Applied Sciences. 13 (5), pp. 1-16. https://doi.org/10.3390/app13052914
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes
Yakubu, M, Y., Khan, M. I., Khan, A., Jabeen, F. and Jeon, G. 2023. Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes. Digital Communications and Networks. pp. 1-15. https://doi.org/10.1016/j.dcan.2023.01.013
Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing
Amin, Z., Anjum, A., Khan, A., Ahmad, A. and Jeon, G. 2022. Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing. Electronics. 11 (8), p. 1257. https://doi.org/10.3390/electronics11081257
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
Kanwal, T., Attaullaha, H., Anjum, A., Khan, A. and Jeon, G. 2022. Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Elsevier Digital Communications and Networks. pp. 1-16. https://doi.org/10.1016/j.dcan.2022.09.025
Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends
Khan, H. M., Khan, A., Khan, B. and Jeon, G. 2022. Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends. MDPI Energies. 15 (24), p. 9350.. https://doi.org/10.3390/en15249350