1 Introduction

The advent of mobile communication and ubiquitous computing has extended opportunities for users to make life easier by accessing vast information through location based services. However, accessing these services may expose users to threat of information disclosure [47]. The existing infrastructure enable mobile applications to track an entity’s position and reveal statistical information based on his location. A wide range of mobile applications provide services including entertainment, health, navigation, and traffic management. These services are accessed on regular basis which is a constant threat for location privacy of a user. Personal data privacy has always been a critical problem and due to expansion of location based services, an adversary can easily track a user’s location on basis of information disclosed. As a consequence, location privacy of the user becomes a challenge. The private information of a user, that has been recorded during his visit to a hospital, library, and social networking website or while driving on a road becomes an invasive catalogue of data.

Location privacy of vehicle networks has become a debatable topic in recent years. Road traffic activities are one of the most important routine activities worldwide [48]. Therefore, trustworthiness of data and position is an indispensable aspect to consider for preserving user privacy. The concept of mix-zone has been proposed by Beresford and Stajano [8] in order to tackle the problem of location privacy in traffic aware applications that explain a mix-zone as an area in which a user can alter pseudonym without being tracked by antagonists. It assists in anonymizing identity of user so that an attacker may not easily get access to user’s real identity. Despite, it still remains a strenuous task to achieve desired level of protection by using a single mix-zone. In order to overcome this hurdle, a concept of multiple mix-zones is proposed to cope with problem of identity correlation over multiple mix-zones involved in a user’s trajectory [41]. Vehicle Ad-hoc Networks (VANET) is the type of network which consists of vehicles having wireless devices known as On Board Units (OBU) which allow communication between multiple vehicles. This aids in generating a very discrete information such as position, speed and direction during communication [57]. Consequently, it gives opportunity to any malevolent adversary to track user and cause harm. In order to encounter this problem, regular variations in pseudonyms are indispensable to ensure privacy. A lot of work has been done in this area. In [64] a pseudonym changing scheme has been presented which is based on a number of neighbor vehicles in VANETS. Author has proposed a validation protocol based on vehicle pseudonym for smart transport system but author does not explain pseudonym communication mechanism [25]. A new scheme is designed based on a security mechanism which is known as periodic pseudonym change, in which two approaches are proposed [2]. First approach suggests a concept of central authority, where every vehicle asks for a new pseudonym after passing of time “t”. According to second approach, a new pseudonym is generated by each vehicle after time “t”. Moreover, each approach is evaluated on bandwidth used and on speed of vehicle. This concept implies that posted road speed is used. Whereas, in real scenario, it is contrary because vehicles travel at different speeds and few of them travel at posted speeds. In order to tackle this problem, we have based our approach on continuous change in pseudonym on road network inside as well as outside mix-zones [3, 7, 39, 44, 55, 66].

In the last decade, various pseudonym changing techniques for the protection of location privacy in VANETS have been proposed [11, 19, 41, 43, 72]. This can be achieved by changing the identifier of a target vehicle called the pseudonym that is chosen randomly. This mechanism is performed by location server, therefore, by executing pseudonym change, the services from main server will be disturbed which is the cause of overhead in the network [10, 46]. Generally, less than 5 s are required to complete the connection [68]. However, in order to design a better location privacy protection approach, factors like high security level along with number of pseudonym-changes are to be considered which are of significant importance. Despite, most of current pseudonyms changing mechanism have ignored this crucial aspect. In this research, researcher has aimed to design a pseudonym changing scheme to reduce number of variations made in pseudonyms, simultaneously, achieving a high level of location privacy. Furthermore, author suggests that general standards for executing pseudonym change comprise of three important factors including life of pseudonym, speed of vehicle, and direction of a vehicle movement. On the basis of this study, an attacker may get distracted if pseudonym is changed but the problem persists because, if a single vehicle changes its pseudonym, it can be tracked easily by an attacker. In order to cope with this problem, another idea is proposed to achieve several variations in pseudonyms inside a mix-zone [16]. It is further explained that a mix-zone can be expressed as the area in which various vehicles can alter their identification at the same time. According to the researcher, only when multiple vehicles are in the mix-zone, the change in pseudonym may occur. On the other hand, an attacker can easily discover mix-zones because, mix-zones are mostly, statically determined [16, 41]. So, this concept led the researchers to explore the idea of dynamic mix-zone [19, 43, 72] that emphasizes on pseudonym changing techniques which are based on dynamically determined mix-zones. In [17] game theory approach has been proposed for non-cooperative location privacy. In this approach, selfish-vehicles alter their pseudonyms when they have maximum payoff but author has failed to explain the consequences when few selfish-vehicles do not change their pseudonyms if they have achieved satisfactory level of location privacy. As a result, vehicles whose pseudonyms have expired may not find enough available vehicles to exchange their pseudonyms. This adversely affects vehicles which are in need of location privacy. Based on the above analysis and limitations of existing work, we proposed a protocol that will generate some inducement for vehicles to change their dynamic pseudonyms inside as well as outside a mix-zone.

Our main contributions are as follows:

  1. (i)

    We introduced a reputation-based method named as Dynamic Pseudonym Multiple Mix-zone (DPMM) which gradually encourages each vehicle to change pseudonym dynamically inside as well as outside a mix-zone over the road network. Moreover it comprise of various parameters like distance, velocity and difference in vehicle’s trend of movement. We also proposed a novel scheme that ensure privacy for road networks and defend vehicles against various attacks.

  2. (ii)

    We proposed a new reputation-based dynamic pseudonym-change protocol for location privacy protection where each vehicle’s verification is carried out at the reported server.

  3. (iii)

    Simulation results revealed that proposed technique outperforms existing techniques and provides better results in terms of acquiring high rate of protection as well as, reduced number of changes required in pseudonyms.

  4. (iv)

    We verified the importance of our technique by using real world mobile vehicle traces and have made comparisons with certain existing methods. Our analysis has revealed that the proposed method has outperformed existing methods especially in terms of privacy preservation, dynamically changing pseudonym, packet delivery ratio, life time of pseudonym and several other factors.

2 Related work

Modern location based systems (LBS) are termed as mobile location services, wireless location services and location aware applications. They may also be termed as software applications, location aware technologies, mobile communication systems and handheld mobile devices [72]. Location based systems are also used by a satellite positioning technology which locates the position of object and people such as Global Positioning System (GPS) and Geographical Information System (GIS) which comprises of databases filled with physical location data. In [80] LBS is generally defined as an application, which provides the information services related to and reliant upon the location of the entity or location information concerned with the traveler. In this context, the author has ignored indoor technologies like Bluetooth, RFID and Wi-Fi and restricts the research to outdoor location based systems where information regarding positioning can be measured by the mobile network or some other device so as to determine the location of mobile device. Henceforth, in order to ensure the privacy of location, pseudonyms are created in an already defined manner. It disables invader to connect with the current pseudonym of a vehicle and the formerly generated pseudonym used by the same vehicle. On the contrary, the alteration in pseudonyms does not produce the robust solution because most often, the vehicles may have dissimilar trajectories and speed. Thus, an assailant can calculate the position using physical correlation. In order to avoid such obstacles, another technique is proposed in [29], where the vehicle remains silent for specific time inside mix-zones after which it will change pseudonym in close time by using minimum K-1 other users .This concept gave researchers a new direction towards fixed mix-zone concept which on the contrary, is confined to be implemented only at path crossings [12, 18, 61, 70].

Fixed mix-zones portray certain general features including zones which are applied at pre-decided positions, and the traffic that enters the system change their pseudonyms (mostly intersections are considered for mix-zones). Moreover, vehicles inside the fixed mix zone, have to remain silent and all communication applications remain passive or disconnected. An important conflict that arises here is that when the pseudonym of a vehicle expires before it enters into the mix-zone, the vehicle may transmit the security message using its previous pseudonyms or it will change to the new pseudonyms. To avoid such ambiguity, the concept of cryptographic fixed mix-zones is implemented at intersections of roads [19]. By implementing the concept of cryptographic fixed mix-zones, message would get encrypted. So, the vehicles inside this area can transmit security information which is contrary to the idea of the fixed mix-zones. It makes the concept of cryptographic fixed mix-zone unfeasible. So, another important addition was made by the Sampigethaya, who proposed that a group of vehicles can be led by a head-vehicle, giving the opportunity to the other automobiles to stay quiet for a long period of interval [4]. It was observed that this idea failed to achieve desired output in time sensitive security applications, resulting in very high end-to-end delay. Apart from that, if head-vehicle is captured by some attacker, then the security and privacy of all other vehicles inside that group will also be at stack.

Therefore, another concept of user-centric approach named as swing and swap was put forward which has amplified the secrecy by allowing vehicles to lightly coordinate their updates by altering their velocity [40]. However, alteration in vehicle’s velocity like that of its path is not adequate. The time duration required for broadcasting a security message consists of a few microseconds, being too short to be regarded as a silent period. So, the method described in [40] fails not only because the pseudonyms updated vehicles stay quiet for a small time but also because this approach is impractical when automobiles are on highway or on a single road. The basic idea proposed by the author is that the vehicle v and its neighbors have to change their pseudonyms until there must be at least K-1(K > =1) vehicles [43]. Hence, in the above defined scenario, when vehicles v’s neighbors are in small number, such as, in the case of a low traffic road, this approach becomes impractical to apply or provides insufficient security level if implemented. A more robust concept based on dynamic mix-zone is given in [84] to avoid this obstacle. In this case, every entity can estimate its defined mix-zone by using a trusted intermediary. In the above defined scenario, it is not compulsory for every vehicle to stay silent in the mix-zone so, it can be implemented for a promising output. But, this approach has also its limitations due to the fact that, a self-centered vehicle may not cooperate during pseudonym change because of large overhead occurring in the process of pseudonym change [5, 33, 34, 50, 52].

A lot of work has been done, which focuses on self-centered and selfish vehicles in the mix-zone [9, 16, 20, 30, 43, 63]. But as a matter of fact, these techniques for securing confidentiality are way too expensive and troublesome. To address such issues, another technique has been proposed in [30]. On the basis of game theory, the author analyzed the location of mixed zones in the optimal regions and has also assumed the occurrence of local antagonist. He further anticipated a conclusion about the optimum behavior of the vehicles and the attacker. Lu et al. [43] also based his study on game theory inferring that vehicles use pseudonyms because of the characteristics of social places. However, both approaches failed to consider vehicle’s varying location privacy. Therefore, building mix-zone for vehicles by using cryptographic approach, has been proposed in [62]. It is moreover, suggested to construct cryptographic mix-zones by placing different road side units (RSU) at the points where extraordinary traffic density is observed. Once cryptographic mix zone has been approached by the vehicle, RSU would assign a symmetric key to the vehicle. As long as the vehicle remains inside this mix-zone, entire communication remains encrypted and an antagonist may not alter data in the message. Vehicles inside the mix-zone will communicate with the vehicles outside the mix-zone being in direct range and may decrypt the messages. Hence, the messages may also be exchanged and decrypted by the vehicles. At the same time, vehicles will change pseudonyms while staying inside the mix-zone. A further research in this area led to an infrastructure less approach which has been presented against the global adversaries in [51, 65]. In this approach, vehicles are grouped together for a short period of time along with maintaining the silent period. In this scenario, all the vehicles remain silent except for the group leader which broadcasts information. Moreover, the remaining vehicles will introduce the period of silence, exposing less information for the adversary, when vehicles change their pseudonyms [14, 21, 38, 42, 69, 71].

While using pseudonyms, we can disconnect the location data from a particular user. In [37] the idea of dynamically changing pseudonyms in a mixed zone was initially introduced, where multiple users meet, restricting an antagonist from connecting multiple pseudonyms of the same user. But, this idea is only applicable when antagonist has just a limited view of user’s movement and analyzes pseudonyms of vehicles while entering and exiting the same mix zone. In [26] authors proposed the path alarming mechanism that adds certain noises to actual location data so that every user can design different possible path by swapping their pseudonyms unless they meet at the same place. This technique, however, may not consider an antagonist’s outside information that can connect each user with a particular location. In [24] the concept consists of location anonymization and is being used by several other researchers [6, 22, 23, 58]. Recently, research has been conducted on location anonymity that focuses on road networks [54, 81]. The concept of Xstar has been offered in [81] which proposed concealing the locations based on QoS requirements and road network privacy. It maintains the stability among the processing cost of unidentified query and the attack resilience of the performed safety. In [54] Casche cloak algorithm has been proposed. In this approach, cache prefetching is used to conceal the actual position of an entity by inviting the location built data over a known path. This algorithm is based on location cloaking and it is not suitable when user asks multiple inquiries along with their movement and may not be implemented where exact point location of mobile users is required [30]. The concept of mix zones to pseudonym changes has been presented in [72] and the construction of road intersection mix-zone concept has been given in [16, 43]. In [17], construction for optimal adjustment of mix zone in a road network has been debated. So, it reflects that in all these mix-zone techniques, most of approaches have followed the concept of circular zone or rectangular zone, and their design methodology is unable to answer the problems related with attacks due to timing and transition in the design mechanism. Therefore, in our research, the problem of confirming an unpredictable value of anonymity has been taken into account, and at the same time, statistics regarding user arrival and other aspects in the road networks have also been considered [31, 32, 35, 36].

3 System model and scenario

3.1 Overall idea definition

We proposed a Dynamic Pseudonym Multiple Mix-zone model (DPMM) for mobile travelers over Road networks. In this model, we allow vehicles to change their pseudonyms dynamically when they enter a mix-zone. We have further placed the reported servers (RS), which will permit communication between road side unit (RSU) and vehicles. Because, vehicles are connected to reported server (RS); they may change pseudonyms even when they are outside a mix-zone. We proved our results by performing experiments and using mathematical models for probability changing pseudonyms and time & speed model as explained in section 3.4 and 3.5 respectively.

3.2 Assumptions

In this research model, we proposed a protocol and assumed that each vehicle has a unique ID (identity information in road network). This ID is only shared with reported server (RS). We also assumed that RS1, RS2… RSn all are connected to main RS servers and main RS verify each unique ID information and provide information to multiple reported server (RS), which is used for requesting a change in pseudonyms when vehicle travels inside or outside a mix-zone. It is further assumed that every vehicle is authenticated by a private or public key. This key allows a vehicle to acquire its pseudonym and its RS information from reported server. Moreover, mix-zone and reported server are trusted entities, while RSU is not a trusted entity. Under such circumstances, a reported server is responsible to control vehicles. RS information and public keys, both are available at reported server. Reported server broadcasts a public pseudonym for each vehicle which comes under its range or detected over road network. The availability feature of RS is almost perfect. Additionally, it has the information of RS private IDs and encrypted information of public keys associated with every vehicle. Thus, RS will acquire a vehicle’s public key and frequently update it.

3.3 Model description

  1. (1)

    In our first approach, we proposed that every vehicle gets associated with RS, where RS allocates a virtual identity and a secret pseudonym. The virtual ID (dummy identity of vehicle user instead of using real identity) is a node identity for vehicle user which is 128-bit address used for both node identity and locator. The virtual ID is pre-defined and randomly assigned by the main reported server. This ID is permanent and thus, no longer bound to the main reported server and/or locations. Once a vehicle receives a virtual identity and a private pseudonym, it will resend it to reported server which, in turn, broadcasts this new generated RS information. Hence, vehicle encryption includes public pseudonym, its virtual identity and timespan of RS information. Time span of RS information can be defined as time which is required for a vehicle to travel at a regular speed to cover distance between two reported servers. During this process, vehicle sends its virtual identity to RS, before its certificate expires. RS will resend newly generated private pseudonym to vehicle when it receives virtual identity of vehicle, while at the same time, it will update reported server regarding the vehicle’s information. Hence, reported server will broadcast certificate. In this approach, vehicles on road are identified by their virtual identity while pseudonyms allow them to communicate. However, in this approach only RS will communicate with road side unit (RSU) as depicted in Fig. 1. The number of road side unit (RSU) may communicate with multiple reported servers which are installed within the infrastructure. Therefore, the capacity of multiple reported servers and number of vehicles to communicate with an infrastructure depends upon the radio coverage of existing RSUs in the nearby area. The bandwidth required to send a request and receive response of pseudonym will be analyzed in section 3 and its parameter is defined in Table 1.

    Fig. 1
    figure 1

    System model dynamic Pseudonyms changing

    Table 1 Notation description

    In Fig. 2, related steps are offered as follows:

    1. 1:

      RS broadcasts periodically its public key.

    2. 2:

      Vehicle sends to RS a ERpbKey(Vid) message.

    3. 3:

      RS sends to the applicant vehicle a EVid(V prpseudo + V vid) message.

    4. 4:

      RS sends to RSU aV RS inforamtion message.

    5. 5:

      RSU broadcasts V RS inforamtion message.

    6. 6:

      Vehicle sends a EV id(V vid) message to the RS.

    7. 7:

      RS delivers a EV id(V' prpseudo + V' vid) message to the vehicle.

    8. 8:

      RS sends to RSU a V' RS inforamtion message.

    9. 9:

      RSU broadcasts V' RS inforamtion message.

    Fig. 2
    figure 2

    Interactions first technique main steps

  2. (2)

    In our second approach, we proposed that every vehicle has both its private and public key. As the vehicle acquires RS public key, it will be authenticated on road network by encrypting its private keys and public keys with RS public key. Hence, vehicle pair keys (i.e. private/public) get registered with RS and in turn, RS will send a set of information to vehicle by encrypting them with vehicle public key. This information contains a message that allows vehicles to create their private pseudonym and certificate. So based on this, when a vehicle receives a set of information, it creates a certificate and a private pseudonym. Once it is done, RS information will be broadcasted. As soon as RS information expires, it will generate a new private pseudonym that will be broadcasted. Pseudonyms are the only way to identify vehicles by using this approach. However, vehicles in second method are free to communicate their private pseudonyms and certificates, once they have been validated by RS. Figure 3 describes different steps of the technique 2. The steps are as follows:

    Fig. 3
    figure 3

    Interactions second technique main steps

    1. 1:

      RS broadcasts periodically its public key.

    2. 2:

      Vehicle sends to RS a ERpbKey(V prKey + V pbKey) message.

    3. 3:

      RS sends to the applicant vehicle a EV pbKey(V pseudRsinf ) message.

    4. 4:

      Vehicle generates its private pseudonym and RS information.

    5. 5:

      Vehicle broadcasts its new RS information.

    6. 6:

      Vehicle updates its private pseudonym and new RS information.

    7. 7:

      Vehicle broadcasts the new RS information.

The RSUs are scattered equidistantly to measure expiration time of certificates and private pseudonyms. Consider “d” as a distance between each road side unit and communication range of each road side unit. Moreover, maximum and minimum speed on road are represented by Vmax and Vmin, respectively. It is assumed that there must be at-least two vehicles which may travel at an average speed. The main goal of our approach is to allow at least two vehicles to acquire pseudonym on road during same time interval. It is denoted by Vm = (Vmax + Vmin)/2. The ratio determined between distance “d” and “Vm” will be the expiry time “t” of certificate and private pseudonym, which is represented by t = d/Vm. The communication range of each road side unit is equal to “d” as mentioned previously. Therefore, any vehicle at any speed can communicate with at least one road side unit and is allowed to change its pseudonym at least once while on the road as shown in Fig.4

Fig. 4
figure 4

Communication scenarios

  1. (i)

    t 0: subnet enter (come-in) time,

  2. (ii)

    t 3: subnet leave (come-out) time,

  3. (iii)

    t s = t 3t 0: subnet residence time,

  4. (iv)

    t 1: current observation time,

  5. (v)

    t 2: new pseudonym update time,

  6. (vi)

    T r : pseudonym change interval.

We model the privacy exposure time with the timing diagram, and develop the optimal pseudonym change algorithm. After the observation starts at t 1, a pseudonym is changed (updated) either at t 2 by a periodical pseudonym change or at t 3 by a handover.

Therefore, the privacy exposure time z is given by

$$ z= \min \left\{{z}_1,{z}_2\right\} $$
(1)

Where z 1 = t 2 − t 1(0 < z 1 < T r ) and z 2 = t 3 − t 1(0 < z 2 < ∞).

Then, the probability density function (PDF) of z is given as:

$$ f(z)={f}_1(z)\int \infty {zf}_2(t)dt+{f}_2(z)\int {Trzf}_1(t)dt $$
(2)

where f 1(z) and f 2(z) are PDFs of z 1 and z 2, respectively.

Now, we need to find proper distributions for z 1 and z 2. The pseudonym change interval Tr is a constant and t1 is a random observer time epoch. Therefore, z1 follows a uniform distribution in [0, T r ] and thus f 1(z) is obtained as:

$$ {f}_1(z)=1 $$
(3)

On the other hand, if the subnet residence time ts follows an exponential distribution with mean of 1/µs, f 2(z) is calculated as:

$$ {f}_2(z)=\mu se-\mu $$
(4)

Then, the PDF of z, (z), can be expressed as:

$$ f(z)=f1(z){\displaystyle \int \infty {zf}_2(t)}dt+{f}_2(z){\displaystyle \int {T}_r}{zf}_1(t)dt=1{T}_{re}-\mu sz+\mu se-\mu {sz}_1{T}_r\left(Tr-z\right) $$

From (2), the Laplace transform of (z), f∗(s), can be obtained and the expected privacy exposure time, E[z], can be obtained from E[z] = (d/ds)f∗(s)|s=0. Suppose a vehicle generates packets with rate λp (packets/s). Let N denote the expected number of packets influenced by the privacy exposure. Then, N is calculated as:

$$ N\left({T}_r\right)=\lambda p\times E\left[z\right] $$
(5)

Intuitively, (T r ) increases with the increase of T r. Therefore, the optimal value of T r can be obtained from the following problem: maximize T r subject to

$$ N\left({T}_r\right)\le \Theta $$
(6)

3.4 Probability changing the pseudonyms

In this section we are going to calculate how probability of changing pseudonyms can be calculated, we have proved our results by simulations and using mathematical equation as explained below.

Φ(v), is the probability that v vehicle is connected to RS and passed through number of mix-zones during the same interval.

Ψ(Pv) is the probability that a vehicle changes pseudonym inside and outside mix-zones while travelling on a road it has chosen to have pseudonym (Pv).

The number of mix-zones in the road system is given by graph and edge (G,E).

The maximum number of vehicles connected which pass through mix-zones on the road system are denoted as mix-zones_r and dynamic pseudonyms are denoted as mix_rdpvt. Here, we define:

$$ \mathrm{G}\ \left(\left[PV1,\dots, PVC\right]\right)\ to\ \mathrm{be}\ \mathrm{the}\ \mathrm{set}\ \mathrm{of}\ \mathrm{dynamic}\ \mathrm{pseudonyms}\ \mathrm{change}\left[PV1,\dots, PVC\right]\ \mathrm{in}\ \mathrm{the}\ \mathrm{graph}\ \mathrm{G},\mathrm{E}. $$
$$ \mathrm{G}\ \left(\left[{PV}_1,\dots, {\ PV}_{\mathrm{C}}\right]\right)=\left\{\mathrm{m}\left|\mathrm{m}=\Big\{\right|\left[{\mathrm{e}}_1,1 \dots {\mathrm{e}1\ PV}_1\right];\left[{\mathrm{e}}_2,1 \dots {\mathrm{e}}_2,{\ PV}_2\right];\dots; \left[ec,1\dots ec,{\ PV}_{\mathrm{C}}\right]|\right\}\wedge \mathrm{ex},\mathrm{y}\in \mathrm{m}\Rightarrow \mathrm{ex},\mathrm{y}\in \mathrm{E}\Big\} $$

So, the probability P of a particular vehicle connected to RS is shown as:

$$ P=\sum_{v\in 0\dots \mathit{\max}- zones\_r\ }\varPhi (v)\times {\sum}_{\begin{array}{c}Pv=\left[PV1,\dots, PVC\right]\Big)\ \\ {}\forall i.{Pv}_i< are\ mix\_ rdpvt\end{array}}{\prod}_{PV1,\dots, PVC\in Pv}\times {\sum}_{g\in G(Pv)}\frac{\left|p\right|p\in g\wedge {\forall}_{e\in \kern0.5em p\ {f}_{g\kern0.5em (e)=1}}}{\left|g\right|} $$
(7)

3.5 Time and speed

In this section we are going to calculate time and speed of vehicle at multiple time and location when vehicle enter inside mix zone and leave mix zone at some time interval.

For a mix zone model, let’s assume Ŝi and Ŝj represent the variables related with the speed of vehicles i and j respectively. The speed in this scenario, follows the Gaussian distribution whereas, the variables Ŝi and Ŝj are assumed to be normal variables. Let t be the time of user at which vehicle exits and is assumed to be t-out (i). However Pi’ → j is the probability of exiting vehicle i’s j and on the other side, Pi’ → i is the probability that the exiting vehicle is i. So, we may assume that if one of these probabilities differs from the other, it will have more chance that adversary will match old pseudonym with new pseudonym [28, 45].

Let’s assume t and t + 1 be the time interval of the vehicle j when it exits the mix zone and P (j, t) represent its probability. So, P (j, t) is equal to the probability that a vehicle j utilizes time in between

(t − t in (j))to(t + 1 − t in (j)) to cover the distance d i (j).

So \( v1=\frac{d_i(j)}{\left(t-{t}_{in}(j)\right)}\kern0.5em to\kern0.5em v2=\frac{d_{i(j)}}{\Big(t+1-{t}_{in(j)\Big)}} \) is the distance with an average speed that vehicle J has to travel during the time interval t to t + 1. Hence it can be written as:

$$ \mathrm{P}\left(\mathrm{j},\mathrm{t}\right)={\int}_{v2}^{v1}\hat{S}j(v)dv $$
(8)

At the same time,

$$ \mathrm{P}\left(\mathrm{i},\mathrm{t}\right)={\displaystyle {\int}_{v2}^{v1}\hat{S}i}(v)dv $$
(9)

Where \( v1=\frac{d_i(j)}{\left(t-{t}_{in}(j)\right)}\kern0.5em to\kern0.5em v2=\frac{d_{i(j)}}{\Big(t+1-{t}_{in(j)\Big)}} \)

We have

$$ \mathrm{P}\left({\mathrm{i}}^{'},\mathrm{t}\right)=P\left(i,t\right)+P\left(j,t\right) $$
(10)

Hence,

$$ {W}_{\tau}^j=-{\sum}_{d=1}^{N_{\tau}^j}{P}_{d\downharpoonright b}{log}_2{P}_{d\downharpoonright b} $$
(11)

Change Pseudonym

$$ {\sum}_{w=0}^{x-1}P\left\{{N}_U^V=w\right\}P\left\{{N}_V^Q=x-1-w\right\}{P}_{V_w}{P}_{q_{x-1-w}} $$
(12)

The above equation represents the probability sum of all the X-1 neighbors of the target vehicle changing their pseudonyms with the target when V w  and Q x − 1 − w meets the basic condition:

$$ \mathrm{P}\left\{\mid At\mid =\mathrm{x}\right\}={\displaystyle {\sum_{w=}^{x-}}_0^1}P\left\{{N}_U^V=w\right\}P\left\{{N}_V^Q=x-1-w\right\} $$
(13)

So, we can also say that when up m is greater than zero, vehicle i will always slater its cost to wj such that wj < \( \left(\frac{u{p}_m{d}_j}{u{p}_m}+1\right) \)

Therefore, vehicle j can vigorously alter its pseudonym at the mix-zone. So, the location privacy of vehicle J can be stated as:

$$ {lpg}_j=-\frac{d_i}{up_m+1}-\left(-{d}_i\right)=\frac{u{p}_m}{u{p}_m+1}.{d}_j $$
(14)

Finally, the feasibility of the PCS strategy in practice is given by.

  1. 1.

    F i  and F i − 1 is the distance between two vehicles and it has been denoted by \( {Y}_i^L \). Variables \( {Y}_1^L,{Y}_2^L,{Y}_3^L\dots \dots .{Y}_i^L \) are independent and identically distributed, and their common probability density function is f(x) =  ⋌ e − ⋌ x.

  2. 2.

    The distance between the left vehicle Li and the target T has been denoted by \( {S}_i^L \). The probability distribution function of \( {S}_i^L \) is given as:

$$ P\left\{{S}_i^l\le x\right\}=1-{e}^{-\rightthreetimes x}\Big[1+\rightthreetimes x+\dots +\frac{{\left(\rightthreetimes x\right)}^{i-1}}{\left(i-1\right)!} $$
(15)
  1. 3.

    The number of vehicles inside the mix-zone having distance r is denoted by V(r) whereas, the probability of the number of vehicles inside mix-zone having distance r is denoted by

$$ P\left\{V(r)=i\right\}=\frac{{\left(\rightthreetimes r\right)}^i}{i!}{e}^{-\rightthreetimes x} $$
(16)

So, now we can calculate the size of anonymity set of the target vehicle in CPN scheme, which is given by:

$$ \begin{array}{l}P\left\{|Ar|=z\right\}=2\\ {}{\displaystyle {\sum}_{n=0}^{K-z}P\left\{{N}_T^L=z-1\right\}}P\left\{{N}_T^R=n\right\}{P}_{l_{z-1}}\left(1-{P}_{R_n}\right)+{\displaystyle {\sum}_{m=0}^{z-1}P\left\{{N}_T^L=m\right\}}P\left\{{N}_T^R=z-1-m\right\}{P}_{t_m}{P}_{R_{z-1-m}}\end{array} $$
(17)

In some situations, an attacker may monitor a subset E n  = {E 1 , E 2 , E 3 ,  …  . E n   which is used to identify a vehicle during PC process. Let’s assume S 0 = (u 1, u 2, . . u n )and S 1 = ( w 1, w 2, …w n ) are the distance vectors of two vehicle’s PC process being observed by an attacker. So, the similarity between S0 and S1 can be re-written as:

$$ \mathit{\cos}\left({S}_0,{S}_1\right)=\frac{S_{0.}{S}_1}{\mid {S}_0\mid .\mid {S}_1\mid }=\frac{\sum_{i=1}^n{x}_i\ .{y}_i}{\sqrt{\sum_{i=1}^n{x}_i^2.{\sum}_{i=1}^n{y}_i^2}} $$
(18)

When S0 and S1 are same, then cos(S 0, S 1) = 1 , because of the monitoring inaccuracy. If ∣1 −  cos (S 0, S 1) ∣   ≤ ε, so for some small confusion values ε > 0 . Therefore, these two PC processes would be vague to the attacker. Thus, in order to implement high location privacy, vehicle should take many vague PC processes simultaneously.

When vehicles enter the mix-zone during the time period Ts, we may write the equation as:

$$ \begin{array}{l}{Q}_r\left[Y=y\right]={\displaystyle \underset{t=0}{\overset{\infty }{\int }}}{Q}_{r\ }\left[Y=y\mid {T}_s=t\right]f(t)dt\\ {}={\displaystyle \underset{t=0}{\overset{\infty }{\int }}}\frac{{\left(\leftthreetimes t\right)}^y}{y!}{e}^{-\leftthreetimes t}f(t)dt\\ {}=\left(\frac{\leftthreetimes^y}{y!}\right){\displaystyle \underset{t=0}{\overset{\infty }{\int }}}{t}^y{e}^{-\leftthreetimes t}f(t)dt\\ {}=\left(\frac{\leftthreetimes^y}{y!}\right)\Big[{\left(-1\right)}^y\frac{d^y{f}^{*}(s)}{ds^y}\\ {}=\frac{\mu {\leftthreetimes}^y}{{\left(\mu +\leftthreetimes \right)}^{y+1}}\end{array} $$
(19)

So, the Laplace transform \( {f}_{\check{e}}^{*}\left(\check{e}\right) \) becomes:

(20)

Hence, S-anonymity can be re-written as:

3.6 Attacks in multiple mix-zones over road networks

In the following section, we shall discuss the possible attacks on the road network.

  1. (1)

    Fabrication Attacks: In this type of attack, an adversary may penetrate some malicious information into the network. When appropriate entity in the network would receive unauthorized packet, it can be misled to some anonymous destination. In addition, an attacker can make this attack by transmitting false information into the network, or the sender could claim that it is somebody else. This attack includes fabricate messages, warnings, certificates, identities [67, 1, 56]. The greedy drivers fabricate messages using broadcast methods and then launch the attack by sending these messages into the network. Fabrication of the messages has two possible forms. False information about an attacker’s ID, speed and location of vehicle is sent to other vehicles or RSU. Another possibility is that the attacker will present himself/herself as an emergency vehicle, so that he/she can drive at a faster speed [60]. Our system avoids this type of attack because of secure communication system architecture and RS server. Secondly, we cloak synchronization (between nodes) and IP filtering in our system.

  2. (2)

    Message Suppression Attacks: In this type of attacks, an adversary might drop down some critical information or some message which is sent to the receiver or hold that information to be used for later time. In road networks, this may create a very critical issue, like the information regarding the accident may not reach to the user in time. In case of any mishap, the information regarding that incident will not immediately be propagated to the insurance authorities. These packets may hold critical information for the receiver. The attacker suppresses these packets and can use them again at another time. The goal of such an attacker would be to prevent registration and insurance authorities from learning about collisions involving his/her vehicle and or to avoid delivering collision reports to roadside access points. For instance, an attacker may suppress a congestion warning and use it at another time so that vehicles do not receive the warning and can be forced to wait in the traffic [27, 49, 53, 73].

  3. (3)

    Alteration Attacks: Adversary, in such attacks, tries to change existing information by using delaying tactics or changing the actual information about the entry of vehicle that has been communicated. In such scenario, an adversary may alter the message by informing its neighbor vehicles on the road network that the road is clear but on the contrary, the road is blocked [59, 67, 75].

  4. (4)

    Denial of Service Attacks (DOS): These are very popular security threats in the communication network. In this type of an attack, the attacker acquires the control of the resources, blocking the channel used by vehicular network. This will restrict the information from arriving safely and timely at final destination. Hence, these types of attacks may hinder drivers who are dependent upon application’s information. In order to avoid such circumstances, the driver may switch between multiple channels or technologies if available like Bluetooth, LTE Wifi and DSRC [15, 67, 82].

  5. (5)

    Replay Attacks: An adversary attacks by repeating the communication of a message that has been received earlier. By doing this, he will take the advantage of current situation and plan some critical attacks. It does not contain sequence numbers or timestamps. As keys can be reused, it is possible to replay stored messages with the same keys to insert bogus messages into the system without any detection. Individual packets must be authenticated, not just encrypted. Packets must have timestamps. The goal of such an attack can be, to confuse the authorities and possibly to prevent identification of vehicles in hit-and-run incidents [27, 73]

4 Experiments and evaluation

4.1 Experiment setup

In this section we present detail about our simulations and experiment, it is further explained that in section 4.2 we have shown the effect of number of mix zones on dynamic change pseudonyms, moreover section 4.3 represent how delay characteristic at road intersection can be calculated, finally section 4.4 explains, how packet delivery ratio can be computed when data is being sent from one vehicle to another vehicle. Furthermore detail about SUMO simulator is given below.

SUMO is an open source, highly portable, microscopic road traffic simulation package designed to handle large road networks. Its main features include collision free vehicle movement, single-vehicle routing, multi-lane streets with lane changing, junction-based right-of-way rules, hierarchy of junction types, an openGL graphical user interface (GUI), and dynamic routing. SUMO can manage large environments, i.e., 10,000 streets. Thus, by combining SUMO, openstreetmap.org and target map, we can simulate traffic in different locations of the globe. However, since SUMO is a pure traffic generator, its generated traces cannot be directly used by the available network simulators, which is a serious shortcoming of this simulator. A widely-known vehicular traffic simulator is SUMO (for further available traffic simulators see [28, 45]. They try to closely represent the movement patterns of users. The Simulation of Urban Mobility (SUMO) mobility generator supports several mobility models, such as the Krauss mobility model with some modifications to allow multi-lane behavior, and the Wagner mobility model. Mobility trace files can be generated from the Google Earth or TIGER databases. Custom (random and user) graphs are also supported, although the node movement is constrained to a grid in a random graph. The SUMO simulator generates mobility based on road networks where movements between source and destination roads are determined by a shortest path algorithm. We use and extend the SUMO simulator to generate feasible mobility traces for e-vehicles. To simulate vehicular traffic in a realistic environment, Northwest Atlanta region maps including details about street type, number of lanes, speed limitations, etc. can be imported to SUMO from geo-data sources. We evaluated our proposed method with SUMO simulator [74, 7779] and real map Northwest Atlanta region Map is used. We have based our analysis covering a large area of 14 km × 12 km and over 10,000 vehicles moving at varying speed. The simulations have been run five times as depicted in Fig.5, moreover network parameters are set as shown in Table 2.

Fig. 5
figure 5

Northwest Atlanta region map scenario using Sumo Simulation

Table 2 Simulation Parameters

4.2 Performance evaluation

The simulation results shown that vehicles passing through multiple mix-zones have changed their pseudonyms dynamically as depicted in Fig. 6. Five different numbers of mix-zones and their data mechanisms corresponding to dynamically changing pseudonyms have been considered respectively. It is worthy to note here that, due to dynamically changing pseudonyms in y-axis as shown in Fig. 6 and Table 3, it is clear that DPMM is a better technique in terms of dynamically changing pseudonyms as compared to EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection) [13], RPCLP (Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks) [83] and MODP (Mix-zones Optimal Deployment for Protecting location privacy) [76]. In particular, DPMM always performs the best. As a matter of fact, pseudonym-change badly influences communication performance. If a pseudonym change interval is longer, then the privacy exposure time increases. However, if pseudonym-change interval is shorter, then overhead increases because of frequent pseudonym change. Therefore, an algorithm is required that finds an optimal pseudonym-change interval for making a balance between communication overhead and location privacy.

Fig. 6
figure 6

Dynamic pseudonym changing

Table 3 An example dynamic pseudonym-based multiple mix-zones generation

The average strength of location privacy for a number of vehicles, moving in SUMO simulation over Northwest Atlanta region map is shown in Fig. 7. The average strength of location privacy achieved by DPMM and EPCS is higher than RPCLP and MODP schemes, where certain selfish-vehicles inside mix-zones possessed greater location privacy thus, refusing to change their pseudonyms. The average strength of location privacy in DPMM scheme is greater when compared with other three schemes because it causes DPMM to make vehicles change their dynamic pseudonyms when they pass inside and outside the mix-zones. We conclude that average strength of location privacy maintains a certain value when numbers of vehicles increase. We further measured distance between two nodes to calculate the average location strength by using Eq. 25.

$$ {Dist}_{avg}\left(i,j\right){ \lim}_{N\to \infty}\frac{1}{N}{\displaystyle {\sum}_{k=1}^N\left|{L}_i\right.}(K)-{L}_j\left.(K)\right| $$
(22)
Fig. 7
figure 7

Location privacy

4.3 Delay characteristics

In vehicle networks, mostly delay characteristics depend upon the road intersection. The adversary formulates road intersections with normal distributions. The delay characteristic has been investigated by using normal distribution that would use trajectory of vehicle on intersection. For example, if f is number of road segments that meets at an intersection, and we have f = 4; for vehicles arriving from u1, their delay characteristic is represented as:

(23)

Where I = 1…… f and e1, e2, e3 and e4 indicates the direction respectively.

4.4 Packet delivery ratio

Packet delay is the time it takes packet to achieve the destination after it leaves the source. The average end to end delay Xavg can be calculated by equation given below where Wr is the emission instant of the package and Wt is the reception instant of the package.

$$ {X}_{avg={\displaystyle {\sum}_{j=1}^{P_r}\left({W}_r-{W}_t\right)}/{P}_r} $$
(24)

Location privacy inside mix-zone and outside mix-zone is represented by Ħ, however, it increases when vehicles cooperate. The strength of location privacy is directly proportional to the number of vehicles that are cooperating inside and outside mix-zone. Hence, after n number of rounds, final strength of location privacy is determined by:

(25)

The average strength of location privacy and dynamic pseudonym’s lifetime is calculated for various seconds as shown in Fig. 8. The average strength of location privacy achieved by RPCLP scheme is highest as compared to DPMM and other two schemes. However, our DPMM scheme statistics still satisfies location privacy.

Fig. 8
figure 8

Average strength of location privacy

Figure 8 shows that the average strength of location privacy maintains a certain value with increase of dynamic pseudonym’s lifetime whereas; dynamic pseudonym’s lifetime has little impact on average strength of location privacy.

We performed our simulations on several vehicle densities as shown in Fig. 9. It is evident from the experiments that with a rapid increase in number of vehicles, communication range decreases greatly as compared with the methods such as EPCS, RPCLP and MODP schemes in terms of time delay and throughput. However, with a shorter time delay, greater will be the DPMM scheme. We compared Fig. 9a, b for time delay, (c with d) for throughput and finally (e with f) for packet delivery ratio, and concluded that DPMM has outperformed EPCS, RPCLP and MODP in terms of time delay, through put and packet delivery ratio. Moreover, in Figs. 10a, b and 11a, b, we observed probability changing pseudonyms inside mix zone and outside mix zone. It is evident from the performed experiments that DPMM scheme performs better in terms of number of vehicles verses probability changing pseudonym. Additionally, as the number of vehicles increases, DPMM will give the better results as compared to other three schemes. Finally, it has been evident from Figs. 9, 10 and 11 that better results are achieved when traffic on road becomes heavier and hence, throughput can get a greater value.

Fig. 9
figure 9

Performace Evaluation

Fig. 10
figure 10

Probability pseudonyms changing in various speed

Fig. 11
figure 11

Probability pseudonyms changing in various speed

We have observed that the process time will be affected by number of mix-zones and the number of target vehicles as shown in Fig. 12. It shows that as the number of mix-zones increases, processing time may also be affected. There are four scenarios that have been shown in the Northwest Atlanta region map moving in different time as 100 s, 200 s, 300 s, 400 s, 500 s and 600 s respectively. All these methods are rising up as the number of mix-zones increases. If numbers of vehicles are high then increases the size of mix-zone to improve the privacy level. Moreover, the main purpose to place multiple mix zones over the road, is the large number of vehicles inside the mix zone. As the number of vehicles increases, there are chances of congestion on the network. So, for that purpose we have increased the number of mix zones, however, by increasing the number of mix zone, we are also increasing the capability of dynamically changing pseudonym inside mix zones as well as outside the mix zone.

Existing methods for pseudonym change are not sufficient for light traffic scenario because of a very long processing time and single change pseudonym, which is unable to meet the conditions for user privacy. However our proposed method is successful enough to remove the issues which are associated with the previous methods. It is evident from above discussion that we have used successful rate and process time to estimate our proposed method, and compared its performances with EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection) [13], RPCLP (Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks) [83] and MODP (Mix-zones Optimal Deployment for protecting location Privacy) [76]. Calculation of the processing time inside the mix zone will not contain a time to send a request in EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection) [13]. We compared successful rates of our method with three existing schemes varying with different mix-zones as shown in Fig.13. The total number of vehicles in the network are 10,000. DPMM has shown a successful rate at a value of 1. However, when compared with EPCS, MODP and RPCL, they have shown a lower successful rate. Moreover, the results verified that vehicle change their dynamic pseudonyms on the basis of the number of neighboring vehicles, as depicted in Fig. 14.

Fig. 12
figure 12

Processing time vs Mix-zones

Fig. 13
figure 13

Successful rate vs Mix-zones

Fig. 14
figure 14

Successful rate vs Number of vehicles

However, DPMM scheme goes up quickly when total number of vehicles increases, and process time is up to 380 s when the total number of vehicles becomes 600 as shown in Fig.15 where we compared processing times of three existing schemes.

Fig. 15
figure 15

Processing time vs Number of vehicles

5 Conclusion

In this research, we proposed an advanced method to improve user privacy in terms of dynamic pseudonyms, while focusing on multiple mix-zones over road networks. Our technique is based on multiple mix-zones using advanced cryptographic communication schemes to protect user privacy against various attacks, where number of pseudonym search user requests are limited in given timeframe. After having a detailed analysis of available literature, we observed that existing schemes only deal with the methods that comprise of a single pseudonym change. However, an attacker can easily trace a single pseudonym change during any basic communication under mix-zone schemes. In this paper, we gradually encouraged each vehicle to change their pseudonym dynamically by using (DPMM) approach inside and outside mix-zone. We proposed a new reputation based dynamic pseudonym change protocol for location privacy protection. Moreover, we proposed a dynamic pseudonym based upon multiple mix-zones (DPMM) generation along with privacy protection, providing various parameters for defending against malicious attacks. We performed our simulation by using SUMO simulator and analyzed results by comparing with several existing pseudonym changing techniques. On the basis of detailed analysis of results, it has been inferred that our simulation results outperformed existing techniques such as EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection) [13], RPCLP (Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks) [83] and MODP (Mix-zones optimal deployment for protecting location privacy) [76]. Furthermore, we obtained better results in terms of achieving high privacy protection rate with a smaller number of pseudonym changes. In our future work, we will examine vehicle to vehicle communication privacy along with focusing on user behavior inside and outside mix-zones over road networks.