CN103338444A - Vehicle position privacy protection method of vehicular ad hoc network - Google Patents

Vehicle position privacy protection method of vehicular ad hoc network Download PDF

Info

Publication number
CN103338444A
CN103338444A CN2013101821379A CN201310182137A CN103338444A CN 103338444 A CN103338444 A CN 103338444A CN 2013101821379 A CN2013101821379 A CN 2013101821379A CN 201310182137 A CN201310182137 A CN 201310182137A CN 103338444 A CN103338444 A CN 103338444A
Authority
CN
China
Prior art keywords
vehicle
pseudo
name
mixed zone
fame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101821379A
Other languages
Chinese (zh)
Other versions
CN103338444B (en
Inventor
应必娣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201310182137.9A priority Critical patent/CN103338444B/en
Publication of CN103338444A publication Critical patent/CN103338444A/en
Application granted granted Critical
Publication of CN103338444B publication Critical patent/CN103338444B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/46Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a vehicle position privacy protection method of a vehicular ad hoc network. The method comprises the following steps: a privacy model is first set to assess a current position privacy of different vehicles so as to reflect a reputation module and a mix-zone criterion of a cooperation degree of the current vehicle; any one vehicle in the vehicular ad hoc network determines whether to cooperate and change a pseudo name to protect a vehicle i according to a current reputation value of the vehicle i sending a pseudo name request and based on a judgment whether the one vehicle is within a mix-zone of the vehicle i; and the reputation value of the one vehicle can be dynamically adjusted according to the current position privacy of the one vehicle and pseudo name residual time. The method of the invention can meet the requirement of protecting the current position of the vehicle and can substantially reduce the energy cost; and the method has the advantages that more vehicles are involved in the pseudo name change and the safety of the position privacy of the vehicular wireless network is greater.

Description

The vehicle location method for secret protection of vehicle-mounted self-organizing network
Technical field
The present invention relates to wireless communication technology field, especially relate to a kind of location privacy that can effectively protect vehicle; Can impel more vehicles to participate in pseudo-name change, thereby significantly improve the vehicle location method for secret protection of vehicle-mounted self-organizing network of the location privacy fail safe of network.
Background technology
Along with developing rapidly of key technologies such as wireless communication technology, vehicle-mounted embedded type calculating and all kinds of onboard sensors, (Vehicular ad hoc network VANET) is considered to the higher imperial scale mobile ad-hoc network of current practical level to vehicle-mounted self-organizing network.Vehicle-mounted self-organizing network is by car and car, car and roadside unit (Roadside Units, RSUs) intelligent transportation system of the inter-vehicular communication of safe, quick, effective, the structure opening that constitutes of intercommunication mutually can the alarm of realization accident, application such as driver assistance.For example in the accident alarm is used, the driver can rely on vehicle-carrying communication to obtain vehicle condition (as the speed of a motor vehicle, direction, position, braking vane pressure etc.) and the real-time road condition information of other vehicles in the scope of over the horizon, thereby effectively avoid traffic accident with congested, safety is fast more to make vehicular traffic.VANET is because wide application prospect and huge social economic benefit thereof, and has been subjected to national governments, the great attention of academia and industrial circle etc.
Yet in vehicle-mounted self-organizing network accident alarm, driver assistance were used, vehicle need be broadcasted heartbeat message continually.These heartbeat messages comprise information such as position, time, direction, speed, acceleration.The assailant can utilize these heartbeat messages to follow the tracks of interested vehicle or reduce their driving trace, serious harm people's personal secrets.
Although can send anonymous heartbeat message by means of a pseudo-name technology, global attack person still can utilize the space time correlation between position, time, the speed that these messages are connected and obtain the location privacy of target vehicle.Some scholars utilize Mixed Zone (Mix-zone) to solve the location privacy problem, and its thought is that all vehicles were changed pseudo-name before leaving the Mixed Zone.If the Mixed Zone area is very big, vehicle needs at least to wait for that the long time could send heartbeat message so.If the Mixed Zone area is less, the assailant is easy to guess the association between position and the pseudo-name.Scholars such as Sampigethaya have proposed the agent communication strategy, namely form a communication group between the adjacent vehicle, represent the group member by group leader and externally issue heartbeat message.Because vehicle fast running, group member change very greatly, this method requires very high to query processing time and call duration time.Scholars such as Carianha are proposed in the intensive zone of vehicle and dispose the encryption Mixed Zone of being set up by RSUs.When vehicle in the Mixed Zone, all communication all must be encrypted.Yet, position, Mixed Zone predetermined fixed, if old pseudo-name the natural duration of life of vehicle arrives, but this vehicle may be in the outside, Mixed Zone.
At the drawback of above-mentioned Mixed Zone, some scholars have proposed dynamic mixing zone territory location privacy protection method, and namely vehicle is dynamically set up the Mixed Zone according to the privacy demand of oneself.For example, when pseudo-name is about to expire or location privacy low the time, vehicle is set up the dynamic mixing zone territory automatically, and requires pseudo-of all vehicles changes the Mixed Zone in.Because in the Mixed Zone, change pseudo-name and can lose a false name certificate and produce extra energy expense, some selfish vehicle can be selected uncooperative, does not namely change pseudo-name and realizes the number one maximization.If lack correct effectively excitation and penalty mechanism in the system, selfish vehicle will consider self privacy maximization, causes initiatively not changing pseudo-name.And pseudo-name is about to overdue vehicle, then must be in the pseudo-name of Mixed Zone change, and uncooperative if other vehicles are all selected, the assailant is easy to infer the mapping relations between the new and old pseudo-name that this vehicle.
Chinese patent mandate publication number: CN101720059A, authorize open day on June 2nd, 2010, a kind of implementation method of vehicle-mounted mobile self-organized network route is disclosed, may further comprise the steps: each intersection arranges node, source node can be transmitted by nearer node to highway section, own place one end distance from destination node when transmitting packet; Node is when transmitting packet, and whether at first judge has in the neighbor table apart from the nearer node of destination node, if having, then directly packet is transmitted to corresponding node; Otherwise selecting adjacent according to the highway section selection algorithm is not the highway section that has just received packet, and the highway section direction is near the highway section of destination node, specifies then that other end node is the highway section receiving terminal node on the road section selected; When routing node never received the same packet that the identical sources node sends with the highway section, selecting one, to receive the packet success rate higher, and time of delay short optimal path, forbid those non-optimum RX path simultaneously.Weak point is that function singleness does not have the location privacy protection function.
Summary of the invention
The present invention in the location privacy protection process for the vehicle-mounted self-organizing network that overcomes prior art, exists selfish vehicle uncooperative, causes the decline of vehicle location personal secrets; Perhaps the vehicle in the vehicle-mounted self-organizing network is frequently changed pseudo-the deficiency that the energy expense of bringing increases, and a kind of location privacy that can effectively protect vehicle is provided; Can impel more vehicles to participate in pseudo-name change, thereby significantly improve the vehicle location method for secret protection of vehicle-mounted self-organizing network of the location privacy fail safe of network.
To achieve these goals, the present invention is by the following technical solutions:
A kind of vehicle location method for secret protection of vehicle-mounted self-organizing network, described vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and described terminal comprises radio receiving transmitting module, microprocessor and memory; Described mobile node and several onboard servers wireless connections, onboard servers is connected by wireless mode or wired mode with Control Server; Comprise the steps:
(1-1) be provided with the Mixed Zone criterion of vehicle i in onboard servers, the Mixed Zone criterion is for to have at least in the Mixed Zone of vehicle i
Figure BDA00003192372800041
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
Figure BDA00003192372800042
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T is the life cycle of pseudo-name, and Δ t is the change threshold value of pseudo-name; P ChpBe the probability of the pseudo-name of each car change in the Mixed Zone, DL i(t) the vehicle location privacy threshold value for setting; K is pseudo-name change number of times;
By DL i(t), P ChpDetermine, for example: DL i(t)=2, P Chp=0.5, then
Figure BDA00003192372800044
Numerical value relevant with location privacy with the fame of the vehicle in the Mixed Zone of the fame of vehicle i, vehicle i.
Being provided with the location privacy model in terminal is:
B i ( t ) = A i k , ( k - 1 ) &Delta;T &le; t < ( k + 1 ) &Delta;T - &Delta;t 0 , k&Delta;T - &Delta;t &le; t < ( k + 1 ) &Delta;T , Wherein
Figure BDA00003192372800046
Be the location privacy grade, α is the old pseudo-name sequence number of vehicle i, and b is the new pseudo-name sequence number of vehicle i; Vehicle fleet for the pseudo-name of change in the Mixed Zone; B i(t) be location privacy, P A → bBe replaced by the probability of new pseudo-name sequence number b for the old pseudo-name sequence number α of vehicle i;
In terminal, be provided with reputation model: R i k = &Sigma; j = 1 k - &Sigma; b = 1 N i j P a &RightArrow; b log 2 P a &RightArrow; b - &Sigma; b = 1 NT i j P a &RightArrow; b log 2 P a &RightArrow; b ,
Figure BDA000031923728000410
After changing pseudo-name through k time, the fame of vehicle i; Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR i(t);
(1-2) before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key is right, with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
(1-3) microprocessor of vehicle i calculates the pseudo-remaining time of vehicle i
Figure BDA00003192372800051
When
Figure BDA00003192372800052
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
(1-4) receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering;
(1-5) other vehicle outside the vehicle i in the setting vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Figure BDA00003192372800053
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame
Figure BDA00003192372800054
The microprocessor of vehicle j calculates the location privacy B of vehicle j j(t), and
Figure BDA00003192372800055
And B j(t) be stored in the memory of vehicle j;
(1-6) in vehicle j drops on the Mixed Zone of vehicle i and
Figure BDA00003192372800056
And the current fame of vehicle j
Figure BDA00003192372800057
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
Figure BDA00003192372800058
And the location privacy B of vehicle j j(t)<DL j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
Figure BDA00003192372800059
With location privacy B j(t), and
Figure BDA000031923728000510
And B j(t) be stored in the memory of vehicle j;
(1-7) receive orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i as vehicle j, then vehicle j abandons command message COMMAND.
Because in the Mixed Zone, the pseudo-name of replacing can lose a false name certificate and produce extra energy expense, for selfish vehicle, can select the uncooperative puppet name of namely not changing to realize the number one maximization.If lack correct effectively excitation and penalty mechanism in the system, selfish vehicle will consider self privacy maximization, causes initiatively not changing pseudo-name.And pseudo-name is about to overdue vehicle, then must change pseudo-name in the Mixed Zone, and is uncooperative if other vehicles are all selected, and the assailant is easy to infer the mapping relations between the new and old pseudo-name that this vehicle.
At the problems referred to above, the present invention at first sets the privacy model for assessment of the current location privacy of different vehicle, is used for reflection when reputation model and the Mixed Zone criterion of the degree of cooperation of vehicle in front.
Whether any vehicle in the vehicle-mounted self-organizing network of the present invention determines whether in the Mixed Zone of vehicle i that according to the current fame of the vehicle i that sends pseudo-name request and from car the pseudo-name of cooperation change protects vehicle i; And can be according to dynamically adjust the fame from car from the current location privacy of car, a pseudo-remaining time.
Simulation result shows that vehicle-mounted self-organizing network location privacy protection method of the present invention can significantly reduce energy expense when the current location privacy that satisfies the protection vehicle requires.Simultaneously, because the introducing of fame makes more vehicle participate in pseudo-name change, thus the fail safe that improves the location privacy of whole vehicle-mounted self-organizing network.
As preferably, step (1-4) also comprises the steps:
Receive the pseudo-name request message RNP of vehicle i when onboard servers after, receive pseudo-name request message RNP that vehicle j sends and vehicle j again in the Mixed Zone of vehicle i, then onboard servers abandons the pseudo-name request message RNP of the vehicle j that receives.
As preferably, the pseudo-name request message RNP in the described step (1-3) comprises the remaining time of current pseudo-name
Figure BDA00003192372800061
New pseudo-name, fame
Figure BDA00003192372800062
The fame threshold DR i(t), current location and the speed of a motor vehicle.
As preferably, the command message COMMAND in the described step (1-4) comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change
Figure BDA00003192372800071
With the fame threshold DR i(t).
As preferably, the pseudo-name request message RNP in the described step (1-3) adopts a broadcast encryption method to encrypt.
As preferably, the message COMMAND in the described step (1-4) adopts broadcast encryption method to encrypt.
As preferably, Δ T is 5 minutes to 30 minutes.
As preferably, Δ t is 1 second to 45 seconds.
Therefore, the present invention has following beneficial effect: (1) can significantly reduce energy expense when the current location that satisfies the protection vehicle requires; (2) more vehicles participate in pseudo-name change, and the location privacy fail safe of onboard wireless network is higher.
Description of drawings
Fig. 1 is a kind of location privacy illustraton of model of vehicle i of the present invention;
Fig. 2 is a kind of flow chart of the present invention;
Fig. 3 is mean place privacy of the present invention and pseudo-name life cycle Δ T graph of a relation;
Fig. 4 is average energy expense and pseudo-name life cycle Δ T graph of a relation;
Fig. 5 is average energy expense and location privacy threshold value graph of a relation;
Fig. 6 is mean place privacy and popularity threshold value graph of a relation.
Embodiment
The present invention will be further described below in conjunction with the drawings and specific embodiments.
Embodiment as described in Figure 2 is a kind of vehicle location method for secret protection of vehicle-mounted self-organizing network, and vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and terminal comprises radio receiving transmitting module, microprocessor and memory; Microprocessor is electrically connected with radio receiving transmitting module and memory respectively; Mobile node and 4 onboard servers wireless connections, onboard servers is connected by wireless mode with Control Server; Comprise the steps:
Step 100 is provided with the Mixed Zone criterion of vehicle i for to have at least in the Mixed Zone of vehicle i in onboard servers
Figure BDA00003192372800081
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
Figure BDA00003192372800082
Span be:
Figure BDA00003192372800083
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T=25 minute, Δ t=0.5 minute; P Chp=0.5, DL i(t)=2.0; K=50;
Be provided with location privacy model as shown in Figure 1 in terminal, the location privacy model is:
B i ( t ) = A i k , ( k - 1 ) &Delta;T &le; t < ( k + 1 ) &Delta;T - &Delta;t 0 , k&Delta;T - &Delta;t &le; t < ( k + 1 ) &Delta;T , Wherein
Figure BDA00003192372800085
Be the location privacy grade,
Figure BDA00003192372800086
α is the old pseudo-name sequence number of vehicle i, and b is the new pseudo-name sequence number of vehicle i;
Figure BDA00003192372800087
Vehicle fleet for the pseudo-name of change in the Mixed Zone; B i(t) be location privacy, P A → bBe replaced by the probability of new pseudo-name sequence number b for the old pseudo-name sequence number α of vehicle i; For example the pseudo-name sequence number of vehicle i before entering the Mixed Zone is α, has 3 cars to change to new pseudo-name in the Mixed Zone, and its new pseudo-name sequence number is respectively b, c, d, and the new pseudo-name sequence number of vehicle i may be in the middle of b, c, the d; P A → b=1/3; B i(t) value and t, k,
Figure BDA00003192372800088
Relevant;
In terminal, be provided with reputation model: R i k = &Sigma; j = 1 k - &Sigma; b = 1 N i j P a &RightArrow; b log 2 P a &RightArrow; b - &Sigma; b = 1 NT i j P a &RightArrow; b log 2 P a &RightArrow; b ,
Figure BDA000031923728000810
After changing pseudo-name through k time, the fame of vehicle i;
Figure BDA00003192372800091
Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR i(t) be 2.0;
Step 200, before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key to with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
Step 300, the microprocessor of vehicle i are calculated the pseudo-remaining time of vehicle i
Figure BDA00003192372800092
When
Figure BDA00003192372800093
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
Step 400, receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering; Pseudo-name request message RNP comprises the remaining time of current pseudo-name
Figure BDA00003192372800094
New pseudo-name, fame The fame threshold DR i(t), current location and the speed of a motor vehicle.
Step 500, other vehicle of setting outside the vehicle i in the vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Figure BDA00003192372800096
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame The microprocessor of vehicle j calculates the location privacy B of vehicle j j(t), and
Figure BDA00003192372800098
And B j(t) be stored in the memory of vehicle j;
Command message COMMAND comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change
Figure BDA00003192372800099
With the fame threshold DR i(t).
Step 600, in vehicle j drops on the Mixed Zone of vehicle i and
Figure BDA000031923728000910
And the current fame of vehicle j
Figure BDA000031923728000911
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
Figure BDA000031923728000912
And the location privacy B of vehicle j j(t)<DL j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
Figure BDA00003192372800101
With location privacy B j(t), and
Figure BDA00003192372800102
And B j(t) be stored in the memory of vehicle j;
Step 700, when vehicle j receives orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i, then vehicle j abandons command message COMMAND.
Below be Simulation results:
The configuration of emulation experiment sees Table 1, and vehicle operating is at the rural road in 2 tracks, and Vehicle Speed is limited in 40 kilometers/hour to 80 kilometers/hour, and the communication radius of vehicle is 250 meters, and Δ t is 0.5 minute.
The configuration of table 1 experiment parameter
Parameter Numerical value
The track 2 tracks
Lane width 3.5 rice
The shortest safety traffic distance 5 meters
Travel speed [40 kilometers/hour 80 kilometers/hour]
The vehicle communication radius 250 meters
Send a RNP energy expense 1mJ
The pseudo-name of change energy expense once 0.1mJ
Δt 0.5 second
k 50
Fig. 3 represents the mean place privacy of vehicle and the relation between the pseudo-name life cycle Δ T.Wherein, the Swap method, be the location privacy of certain vehicle less than remaining time of location privacy threshold value or pseudo-name during less than Δ t, this vehicle enters pseudo-name change procedure.
The Non-Reputation method is that then this vehicle is not changed pseudo-name if the location privacy of certain vehicle satisfies the location privacy threshold value in the Mixed Zone.Location privacy threshold value DL in the present embodiment i(t) be log 2(5), popularity threshold DR i(t) be 2.0.
As shown in Figure 3, the location privacy of the present invention and Swap method will be higher than location privacy threshold value log 2And the location privacy value of Non-Reputation method remains on 2.3 (5).Its reason is: in the Non-Reputation method, do not change pseudo-name in case selfish vehicle satisfies the location privacy threshold value, make the location privacy value of vehicle i descend, thereby cause the mean place privacy of whole system to descend.
In addition, as shown in Figure 3, the life cycle of pseudo-name is little to the influence of mean place privacy, and its reason is if the remaining time of pseudo-name
Figure BDA00003192372800111
All vehicles are all changed pseudo-name.
Fig. 4 has provided the average energy expense of system and the relation between the pseudo-name life cycle.Wherein, location privacy threshold value DL i(t) be log 2(5), DR i(t) the popularity threshold value is 2.0.
As shown in Figure 4, energy expense of the present invention is about 2.5mJ, and the Swap method is about 37mJ, and its main cause is to compare with the Swap method, and the present invention has reduced pseudo-name change number of times.Compare with the present invention, the Non-Reputation method makes more vehicle send RNP message, thereby causes energy expense bigger than the present invention because the mean place privacy is low.
Table 2 provides the mean place privacy of three kinds of methods of diverse location privacy threshold value.Compare with the Swap method, the present invention does not cause the mean place privacy low because selfish vehicle is not initiatively changed pseudo-name, but the present invention can meet the location privacy threshold value of vehicle.Compare with the Non-Reputation method, the present invention makes the mean place privacy increase owing to introduce the popularity incentive measure.
Concern between table 2 mean place privacy and the threshold value
Figure BDA00003192372800112
Figure BDA00003192372800121
Fig. 5 represents the relation between average energy expense and the location privacy threshold value.As shown in Figure 5, the average energy expense of the present invention and Non-Reputation method increases along with the increase of location privacy threshold value, and the Swap method is opposite.Its reason is as follows: when the Mixed Zone hour, thereby vehicle is difficult to reach the location privacy threshold value and constantly sends RNP message and require to enter pseudo-name change procedure in the Swap method; And in the present invention and the Non-Reputation method, because the pseudo-name of the inner separating vehicles change in Mixed Zone, along with the location privacy threshold value increases, more vehicle need be changed pseudo-name and satisfy the location privacy threshold value.
Fig. 6 has provided the relation between mean place privacy and the popularity threshold value.
As shown in Figure 6, along with the increase of popularity threshold value, mean place privacy of the present invention also increases thereupon.This causes more vehicle need pass through the fame of the pseudo-name ability of change raising itself mainly due to the increase of popularity threshold value.
Should be understood that present embodiment only to be used for explanation the present invention and be not used in and limit the scope of the invention.Should be understood that in addition those skilled in the art can make various changes or modifications the present invention after the content of having read the present invention's instruction, these equivalent form of values fall within the application's appended claims institute restricted portion equally.

Claims (8)

1. the vehicle location method for secret protection of a vehicle-mounted self-organizing network, described vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and described terminal comprises radio receiving transmitting module, microprocessor and memory; Described mobile node and several onboard servers wireless connections, onboard servers is connected by wireless mode or wired mode with Control Server; It is characterized in that, comprise the steps:
(1-1) be provided with the Mixed Zone criterion of vehicle i in onboard servers, the Mixed Zone criterion is for to have at least in the Mixed Zone of vehicle i
Figure FDA00003192372700011
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
Figure FDA00003192372700012
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T is the life cycle of pseudo-name, and Δ t is the change threshold value of pseudo-name; P ChpBe the probability of the pseudo-name of each car change in the Mixed Zone, DL i(t) the vehicle location privacy threshold value for setting; K is pseudo-name change number of times;
Being provided with the location privacy model in terminal is:
B i ( t ) = A i k , ( k - 1 ) &Delta;T &le; t < ( k + 1 ) &Delta;T - &Delta;t 0 , k&Delta;T - &Delta;t &le; t < ( k + 1 ) &Delta;T , Wherein
Figure FDA00003192372700014
Be the location privacy grade, α is the old pseudo-name sequence number of vehicle i, and b is the new pseudo-name sequence number of vehicle i;
Figure FDA00003192372700016
Vehicle fleet for the pseudo-name of change in the Mixed Zone; B i(t) be location privacy, P A → bBe replaced by the probability of new pseudo-name sequence number b for the old pseudo-name sequence number α of vehicle i;
In terminal, be provided with reputation model: R i k = &Sigma; j = 1 k - &Sigma; b = 1 N i j P a &RightArrow; b log 2 P a &RightArrow; b - &Sigma; b = 1 NT i j P a &RightArrow; b log 2 P a &RightArrow; b ,
Figure FDA00003192372700018
After changing pseudo-name through k time, the fame of vehicle i;
Figure FDA00003192372700019
Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR i(t);
(1-2) before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key is right, with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
(1-3) microprocessor of vehicle i calculates the pseudo-remaining time of vehicle i
Figure FDA00003192372700021
When
Figure FDA00003192372700022
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
(1-4) receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering;
(1-5) other vehicle outside the vehicle i in the setting vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Figure FDA00003192372700023
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame The microprocessor of vehicle j calculates the location privacy B of vehicle j j(t), and
Figure FDA00003192372700025
And B j(t) be stored in the memory of vehicle j;
(1-6) in vehicle j drops on the Mixed Zone of vehicle i and
Figure FDA00003192372700026
And the current fame of vehicle j
Figure FDA00003192372700027
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
Figure FDA00003192372700028
And the location privacy B of vehicle j j(t)<DL j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
Figure FDA00003192372700029
With location privacy B j(t), and
Figure FDA000031923727000210
And B j(t) be stored in the memory of vehicle j;
(1-7) receive orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i as vehicle j, then vehicle j abandons command message COMMAND.
2. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, step (1-4) also comprises the steps:
Receive the pseudo-name request message RNP of vehicle i when onboard servers after, receive the pseudo-name request message RNP that vehicle j sends again, and vehicle j is in the Mixed Zone of vehicle i, then onboard servers abandons the pseudo-name request message RNP of the vehicle j that receives.
3. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the pseudo-name request message RNP in the described step (1-3) comprises the remaining time of current pseudo-name
Figure FDA00003192372700031
New pseudo-name, fame
Figure FDA00003192372700032
The fame threshold DR i(t), current location and the speed of a motor vehicle.
4. vehicle-mounted self-organizing network location privacy protection method according to claim 1 is characterized in that, the command message COMMAND in the described step (1-4) comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change With the fame threshold DR i(t).
5. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the pseudo-name request message RNP in the described step (1-3) adopts broadcast encryption method to encrypt.
6. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the message COMMAND in the described step (1-4) adopts broadcast encryption method to encrypt.
7. according to the vehicle location method for secret protection of claim 1 or 2 or 3 or 4 or 5 or 6 described vehicle-mounted self-organizing networks, it is characterized in that Δ T is 5 minutes to 30 minutes.
8. according to the vehicle location method for secret protection of claim 1 or 2 or 3 or 4 or 5 or 6 described vehicle-mounted self-organizing networks, it is characterized in that Δ t is 1 second to 45 seconds.
CN201310182137.9A 2013-05-15 2013-05-15 The vehicle position privacy protection method of vehicular ad hoc network Expired - Fee Related CN103338444B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310182137.9A CN103338444B (en) 2013-05-15 2013-05-15 The vehicle position privacy protection method of vehicular ad hoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310182137.9A CN103338444B (en) 2013-05-15 2013-05-15 The vehicle position privacy protection method of vehicular ad hoc network

Publications (2)

Publication Number Publication Date
CN103338444A true CN103338444A (en) 2013-10-02
CN103338444B CN103338444B (en) 2015-11-04

Family

ID=49246526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310182137.9A Expired - Fee Related CN103338444B (en) 2013-05-15 2013-05-15 The vehicle position privacy protection method of vehicular ad hoc network

Country Status (1)

Country Link
CN (1) CN103338444B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812354A (en) * 2016-03-07 2016-07-27 江苏大学 LBS-based anti-attack location privacy protection method for IoV
CN106911670A (en) * 2017-01-13 2017-06-30 重庆邮电大学 Intimacy protection system and method in a kind of car networking
CN107580048A (en) * 2017-09-04 2018-01-12 东北大学 A kind of VANETs location privacy protection system and methods based on virtual Mix zone
CN107947942A (en) * 2017-11-30 2018-04-20 安徽大学 Vehicle position privacy protection method based on group ranking and prestige
CN108476403A (en) * 2016-02-26 2018-08-31 慧与发展有限责任合伙企业 Equipment secret protection
CN108616813A (en) * 2018-03-22 2018-10-02 大连理工大学 A kind of car networking location privacy protection scheme based on mixed zone
CN109089241A (en) * 2018-10-24 2018-12-25 常熟理工学院 A kind of data communication implementation method of vehicle-mounted net
CN111465010A (en) * 2020-04-08 2020-07-28 南京大学 Method for protecting vehicle position privacy in cooperative driving
US10993108B2 (en) 2015-03-17 2021-04-27 Nokia Technologies Oy Wireless routing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040224664A1 (en) * 2003-05-07 2004-11-11 Nokia Corporation Mobile user location privacy solution based on the use of multiple identities
CN102740286A (en) * 2012-05-23 2012-10-17 杨涛 Floating vehicle-based traceability vehicle self-networking communication privacy protection method
CN102907151A (en) * 2010-06-01 2013-01-30 微软公司 Hybrid mobile phone geopositioning
CN102904896A (en) * 2012-10-23 2013-01-30 大连理工大学 Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040224664A1 (en) * 2003-05-07 2004-11-11 Nokia Corporation Mobile user location privacy solution based on the use of multiple identities
CN102907151A (en) * 2010-06-01 2013-01-30 微软公司 Hybrid mobile phone geopositioning
CN102740286A (en) * 2012-05-23 2012-10-17 杨涛 Floating vehicle-based traceability vehicle self-networking communication privacy protection method
CN102904896A (en) * 2012-10-23 2013-01-30 大连理工大学 Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10993108B2 (en) 2015-03-17 2021-04-27 Nokia Technologies Oy Wireless routing
CN108476403A (en) * 2016-02-26 2018-08-31 慧与发展有限责任合伙企业 Equipment secret protection
CN105812354A (en) * 2016-03-07 2016-07-27 江苏大学 LBS-based anti-attack location privacy protection method for IoV
CN105812354B (en) * 2016-03-07 2019-01-18 江苏大学 Location privacy protection method based on attack resistance in car networking under a kind of LBS background
CN106911670A (en) * 2017-01-13 2017-06-30 重庆邮电大学 Intimacy protection system and method in a kind of car networking
CN106911670B (en) * 2017-01-13 2020-09-29 重庆邮电大学 Privacy protection system and method in Internet of vehicles
WO2019041896A1 (en) * 2017-09-04 2019-03-07 东北大学 Virtual mix-zone-based vanet position privacy protection system and method
CN107580048A (en) * 2017-09-04 2018-01-12 东北大学 A kind of VANETs location privacy protection system and methods based on virtual Mix zone
CN107947942B (en) * 2017-11-30 2019-08-27 安徽大学 Vehicle position privacy protection method based on group ranking and prestige
CN107947942A (en) * 2017-11-30 2018-04-20 安徽大学 Vehicle position privacy protection method based on group ranking and prestige
CN108616813A (en) * 2018-03-22 2018-10-02 大连理工大学 A kind of car networking location privacy protection scheme based on mixed zone
CN109089241A (en) * 2018-10-24 2018-12-25 常熟理工学院 A kind of data communication implementation method of vehicle-mounted net
CN109089241B (en) * 2018-10-24 2020-12-04 常熟理工学院 Data communication implementation method for vehicle-mounted network
CN111465010A (en) * 2020-04-08 2020-07-28 南京大学 Method for protecting vehicle position privacy in cooperative driving
CN111465010B (en) * 2020-04-08 2021-07-30 南京大学 Method for protecting vehicle position privacy in cooperative driving

Also Published As

Publication number Publication date
CN103338444B (en) 2015-11-04

Similar Documents

Publication Publication Date Title
CN103338444B (en) The vehicle position privacy protection method of vehicular ad hoc network
CN107733459A (en) The vehicle-mounted T Box to be communicated based on DSRC and low-altitude satellite and its application
Rawat et al. Vehicular cyber physical systems
CN104537852B (en) A kind of road burst accident reminding method collaborative based on bus or train route
Boualouache et al. S2si: A practical pseudonym changing strategy for location privacy in vanets
Chen et al. Broadcasting safety information in vehicular networks: issues and approaches
Popescu-Zeletin et al. Vehicular-2-X communication: state-of-the-art and research in mobile vehicular ad hoc networks
CN102625237B (en) Method for selecting optimum relay in communication between wayside device and vehicle
Shen et al. Cooperative message authentication in vehicular cyber-physical systems
CN103338436B (en) The pseudo-name change method of vehicle of vehicular ad hoc network
Fogue et al. Securing warning message dissemination in VANETs using cooperative neighbor position verification
Rawat et al. Securing vehicular ad-hoc networks against malicious drivers: A probabilistic approach
Sou Modeling emergency messaging for car accident over dichotomized headway model in vehicular ad-hoc networks
CN108346318A (en) A kind of control method and device of car networking communication
Noori et al. A connected vehicle based traffic signal control strategy for emergency vehicle preemption
Souza et al. Decreasing greenhouse emissions through an intelligent traffic information system based on inter-vehicle communication
Lyu et al. Fine-grained TDMA MAC design toward ultra-reliable broadcast for autonomous driving
Sharma et al. A survey: Issues and challenges of vehicular ad hoc networks (VANETs)
CN111447591A (en) Vehicle networking data exchange method based on block chain
CN103428688A (en) Continuous location-based service privacy protection method for vehicle-mounted self-organizing network
Al-Ani et al. Adjusted location privacy scheme for VANET safety applications
CN108040327A (en) Message relay method, car-mounted terminal, automobile and intelligent transport system
Benaidja et al. An optimal broadcast of warning messages in vehicular ad hoc networks
Sireesha et al. A survey of VANET Security models and its issues on node level data transmission
Eckhoff et al. SmartRevoc: An efficient and privacy preserving revocation system using parked vehicles

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151104

Termination date: 20170515