浏览全部资源
扫码关注微信
1. 安徽大学计算机科学与技术学院,安徽 合肥 230601
2. 安徽省物联网安全技术工程实验室,安徽 合肥 230601
3. 安徽大学物质科学与信息技术研究院,安徽 合肥 230601
[ "崔杰(1980− ),男,河南淮阳人,博士,安徽大学教授、博士生导师,主要研究方向为车联网安全、物联网安全等" ]
[ "陈学峰(1995− ),男,安徽合肥人,安徽大学硕士生,主要研究方向为车联网安全与位置隐私保护" ]
[ "张静(1990− ),女,河南永城人,安徽大学博士生,主要研究方向为车联网安全、物联网安全等" ]
[ "魏璐(1993− ),男,安徽安庆人,安徽大学博士生,主要研究方向为车联网安全、物联网安全等" ]
[ "仲红(1965− ),女,安徽固镇人,博士,安徽大学教授、博士生导师,主要研究方向为网络与信息安全" ]
网络出版日期:2021-07,
纸质出版日期:2021-07-25
移动端阅览
崔杰, 陈学峰, 张静, 等. 基于公交车缓存的车联网位置隐私保护方案[J]. 通信学报, 2021,42(7):150-161.
Jie CUI, Xuefeng CHEN, Jing ZHANG, et al. Bus cache-based location privacy protection scheme in the Internet of vehicles[J]. Journal on communications, 2021, 42(7): 150-161.
崔杰, 陈学峰, 张静, 等. 基于公交车缓存的车联网位置隐私保护方案[J]. 通信学报, 2021,42(7):150-161. DOI: 10.11959/j.issn.1000-436x.2021132.
Jie CUI, Xuefeng CHEN, Jing ZHANG, et al. Bus cache-based location privacy protection scheme in the Internet of vehicles[J]. Journal on communications, 2021, 42(7): 150-161. DOI: 10.11959/j.issn.1000-436x.2021132.
为了解决车联网中车辆用户使用基于位置的服务(LBS)时真实位置的泄露问题,提出一种基于公交车缓存的位置隐私保护方案。公交车先根据其线路信息向LBS提供商获取兴趣点(POI)池,然后在行驶时根据其当前位置从POI池中挑选部分POI数据形成POI列表并广播给周围私家车。私家车在接收到广播信息后,验证公交车身份,然后将POI列表存储到车辆的本地缓存中。当私家车需要查询POI信息时,首先在本地缓存中进行检索,若缓存未命中再以 k-匿名的方式向 LBS 提供商发送查询请求。仿真实验结果表明,所提方案通过减少私家车与LBSP的通信次数,能够降低私家车真实位置泄露的可能性,从而有效提高私家车的位置隐私保护水平。
To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles
a location privacy protection scheme based on bus cache was proposed.Firstly
a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally
the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data
it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information
it would first retrieve it in the local cache
and if the cache was missed
it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP
thereby effectively improving the privacy protection level of the private vehicle.
LAI C Z , LU R X , ZHENG D , et al . Security and privacy challenges in 5G-enabled vehicular networks [J ] . IEEE Network , 2020 , 34 ( 2 ): 37 - 45 .
ZHANG J , CUI J , ZHONG H , et al . PA-CRT:Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 18 ( 2 ): 722 - 735 .
LAI C Z , ZHANG K , CHENG N , et al . SIRC:a secure incentive scheme for reliable cooperative downloading in highway VANETs [J ] . IEEE Transactions on Intelligent Transportation Systems , 2017 , 18 ( 6 ): 1559 - 1574 .
YANG Y , DANG S P , HE Y J , et al . Markov decision-based pilot optimization for 5G V2X vehicular communications [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 1 ): 1090 - 1103 .
HE D B , ZEADALLY S , XU B W , et al . An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 12 ): 2681 - 2691 .
HU L , QIAN Y F , CHEN M , et al . Proactive cache-based location privacy preserving for vehicle networks [J ] . IEEE Wireless Communications , 2018 , 25 ( 6 ): 77 - 83 .
张文静 , 刘樵 , 朱辉 . 基于信息论方法的多等级位置隐私度量与保护 [J ] . 通信学报 , 2019 , 40 ( 12 ): 51 - 59 .
ZHANG W J , LIU Q , ZHU H . Evaluation and protection of multi-level location privacy based on an information theoretic approach [J ] . Journal on Communications , 2019 , 40 ( 12 ): 51 - 59 .
叶阿勇 , 孟玲玉 , 赵子文 , 等 . 基于预测和滑动窗口的轨迹差分隐私保护机制 [J ] . 通信学报 , 2020 , 41 ( 4 ): 123 - 133 .
YE A Y , MENG L Y , ZHAO Z W , et al . Trajectory differential privacy protection mechanism based on prediction and sliding window [J ] . Journal on Communications , 2020 , 41 ( 4 ): 123 - 133 .
LI Q Y , WU H , WU X , et al . Multi-level location privacy protection based on differential privacy strategy in VANETs [C ] // 2019 IEEE 89th Vehicular Technology Conference . Piscataway:IEEE Press , 2019 : 1 - 5 .
ZHANG Y , TONG W , ZHONG S . On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 11 ): 2528 - 2541 .
LIU B , ZHOU W L , ZHU T Q , et al . Silence is golden:enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 12 ): 9942 - 9953 .
CUI J , ZHANG X Y , ZHONG H , et al . Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment [J ] . IEEE Transactions on Information Forensics and Security , 2020 , 15 : 1654 - 1667 .
CHENG J J , CHENG J L , ZHOU M C , et al . Routing in Internet of vehicles:a review [J ] . IEEE Transactions on Intelligent Transportation Systems , 2015 , 16 ( 5 ): 2339 - 2352 .
YI X , PAULET R , BERTINO E , et al . Practical k nearest neighbor queries with location privacy [C ] // 2014 IEEE 30th International Conference on Data Engineering . Piscataway:IEEE Press , 2014 : 640 - 651 .
PAULET R , KAOSAR M G , YI X , et al . Privacy-preserving and content-protecting location based queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2014 , 26 ( 5 ): 1200 - 1210 .
BERESFORD A R , STAJANO F . Location privacy in pervasive computing [J ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // The 1st International Conference on Mobile Systems,Applications and Services . Berkeley:USENIX Association , 2003 : 31 - 42 .
裴卓雄 , 李兴华 , 刘海 , 等 . LBS 隐私保护中基于查询范围的匿名区构造方案 [J ] . 通信学报 , 2017 , 38 ( 9 ): 125 - 132 .
PEI Z X , LI X H , LIU H , et al . Anonymizing region construction scheme based on query range in location-based service privacy protection [J ] . Journal on Communications , 2017 , 38 ( 9 ): 125 - 132 .
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service [C ] // Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems . New York:ACM Press , 2006 : 171 - 178 .
CUI J , WEN J Y , HAN S S , et al . Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 5 ): 3491 - 3498 .
REN W T , TANG S H . EGeoIndis:an effective and efficient location privacy protection framework in traffic density detection [J ] . Vehicular Communications , 2020 ,21:100187.
PAN J J , LIU Y N , ZHANG W M . Detection of dummy trajectories using convolutional neural networks [J ] . Security and Communication Networks , 2019 , 2019 : 1 - 12 .
AMINI S , LINDQVIST J , HONG J , et al . Caché:caching location-enhanced content to improve user privacy [C ] // Proceedings of the 9th International Conference on Mobile Systems,Applications,and Services . New York:ACM Press , 2011 : 197 - 210 .
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al . Hiding in the mobile crowd:LocationPrivacy through collaboration [J ] . IEEE Transactions on Dependable and Secure Computing , 2014 , 11 ( 3 ): 266 - 279 .
NIU B , LI Q H , ZHU X Y , et al . Enhancing privacy through caching in location-based services [C ] // 2015 IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2015 : 1017 - 1025 .
PENG T , LIU Q , MENG D C , et al . Collaborative trajectory privacy preserving scheme in location-based services [J ] . Information Sciences , 2017 , 387 : 165 - 179 .
ZHANG S B , CHOO K K R , LIU Q , et al . Enhancing privacy through uniform grid and caching in location-based services [J ] . Future Generation Computer Systems , 2018 , 86 : 881 - 892 .
MENEZES A J , VANSTONE S A . Elliptic curve cryptosystems and their implementation [J ] . Journal of Cryptology , 1993 , 6 ( 4 ): 209 - 224 .
CUI J , ZHANG X Y , ZHONG H , et al . RSMA:reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 4 ): 6417 - 6428 .
PETIT J , SCHAUB F , FEIRI M , et al . Pseudonym schemes in vehicular networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2015 , 17 ( 1 ): 228 - 255 .
LAI C Z , ZHANG M , CAO J , et al . SPIR:a secure and privacy-preserving incentive scheme for reliable real-time map updates [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 1 ): 416 - 428 .
CHENG J J , YUAN G Y , ZHOU M C , et al . A fluid mechanics-based data flow model to estimate VANET capacity [J ] . IEEE Transactions on Intelligent Transportation Systems , 2020 , 21 ( 6 ): 2603 - 2614 .
CAO Y , XIAO Y H , XIONG L , et al . PriSTE:from location privacy to spatiotemporal event privacy [C ] // 2019 IEEE 35th International Conference on Data Engineering . Piscataway:IEEE Press , 2019 : 1606 - 1609 .
SOMMER C , GERMAN R , DRESSLER F . Bidirectionally coupled network and road traffic simulation for improved IVC analysis [J ] . IEEE Transactions on Mobile Computing , 2011 , 10 ( 1 ): 3 - 15 .
0
浏览量
822
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构