CN103338444A - Vehicle position privacy protection method of vehicular ad hoc network - Google Patents
Vehicle position privacy protection method of vehicular ad hoc network Download PDFInfo
- Publication number
- CN103338444A CN103338444A CN2013101821379A CN201310182137A CN103338444A CN 103338444 A CN103338444 A CN 103338444A CN 2013101821379 A CN2013101821379 A CN 2013101821379A CN 201310182137 A CN201310182137 A CN 201310182137A CN 103338444 A CN103338444 A CN 103338444A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- pseudo
- name
- mixed zone
- fame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000008859 change Effects 0.000 claims abstract description 38
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 2
- 238000004891 communication Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 5
- 230000005284 excitation Effects 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/46—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a vehicle position privacy protection method of a vehicular ad hoc network. The method comprises the following steps: a privacy model is first set to assess a current position privacy of different vehicles so as to reflect a reputation module and a mix-zone criterion of a cooperation degree of the current vehicle; any one vehicle in the vehicular ad hoc network determines whether to cooperate and change a pseudo name to protect a vehicle i according to a current reputation value of the vehicle i sending a pseudo name request and based on a judgment whether the one vehicle is within a mix-zone of the vehicle i; and the reputation value of the one vehicle can be dynamically adjusted according to the current position privacy of the one vehicle and pseudo name residual time. The method of the invention can meet the requirement of protecting the current position of the vehicle and can substantially reduce the energy cost; and the method has the advantages that more vehicles are involved in the pseudo name change and the safety of the position privacy of the vehicular wireless network is greater.
Description
Technical field
The present invention relates to wireless communication technology field, especially relate to a kind of location privacy that can effectively protect vehicle; Can impel more vehicles to participate in pseudo-name change, thereby significantly improve the vehicle location method for secret protection of vehicle-mounted self-organizing network of the location privacy fail safe of network.
Background technology
Along with developing rapidly of key technologies such as wireless communication technology, vehicle-mounted embedded type calculating and all kinds of onboard sensors, (Vehicular ad hoc network VANET) is considered to the higher imperial scale mobile ad-hoc network of current practical level to vehicle-mounted self-organizing network.Vehicle-mounted self-organizing network is by car and car, car and roadside unit (Roadside Units, RSUs) intelligent transportation system of the inter-vehicular communication of safe, quick, effective, the structure opening that constitutes of intercommunication mutually can the alarm of realization accident, application such as driver assistance.For example in the accident alarm is used, the driver can rely on vehicle-carrying communication to obtain vehicle condition (as the speed of a motor vehicle, direction, position, braking vane pressure etc.) and the real-time road condition information of other vehicles in the scope of over the horizon, thereby effectively avoid traffic accident with congested, safety is fast more to make vehicular traffic.VANET is because wide application prospect and huge social economic benefit thereof, and has been subjected to national governments, the great attention of academia and industrial circle etc.
Yet in vehicle-mounted self-organizing network accident alarm, driver assistance were used, vehicle need be broadcasted heartbeat message continually.These heartbeat messages comprise information such as position, time, direction, speed, acceleration.The assailant can utilize these heartbeat messages to follow the tracks of interested vehicle or reduce their driving trace, serious harm people's personal secrets.
Although can send anonymous heartbeat message by means of a pseudo-name technology, global attack person still can utilize the space time correlation between position, time, the speed that these messages are connected and obtain the location privacy of target vehicle.Some scholars utilize Mixed Zone (Mix-zone) to solve the location privacy problem, and its thought is that all vehicles were changed pseudo-name before leaving the Mixed Zone.If the Mixed Zone area is very big, vehicle needs at least to wait for that the long time could send heartbeat message so.If the Mixed Zone area is less, the assailant is easy to guess the association between position and the pseudo-name.Scholars such as Sampigethaya have proposed the agent communication strategy, namely form a communication group between the adjacent vehicle, represent the group member by group leader and externally issue heartbeat message.Because vehicle fast running, group member change very greatly, this method requires very high to query processing time and call duration time.Scholars such as Carianha are proposed in the intensive zone of vehicle and dispose the encryption Mixed Zone of being set up by RSUs.When vehicle in the Mixed Zone, all communication all must be encrypted.Yet, position, Mixed Zone predetermined fixed, if old pseudo-name the natural duration of life of vehicle arrives, but this vehicle may be in the outside, Mixed Zone.
At the drawback of above-mentioned Mixed Zone, some scholars have proposed dynamic mixing zone territory location privacy protection method, and namely vehicle is dynamically set up the Mixed Zone according to the privacy demand of oneself.For example, when pseudo-name is about to expire or location privacy low the time, vehicle is set up the dynamic mixing zone territory automatically, and requires pseudo-of all vehicles changes the Mixed Zone in.Because in the Mixed Zone, change pseudo-name and can lose a false name certificate and produce extra energy expense, some selfish vehicle can be selected uncooperative, does not namely change pseudo-name and realizes the number one maximization.If lack correct effectively excitation and penalty mechanism in the system, selfish vehicle will consider self privacy maximization, causes initiatively not changing pseudo-name.And pseudo-name is about to overdue vehicle, then must be in the pseudo-name of Mixed Zone change, and uncooperative if other vehicles are all selected, the assailant is easy to infer the mapping relations between the new and old pseudo-name that this vehicle.
Chinese patent mandate publication number: CN101720059A, authorize open day on June 2nd, 2010, a kind of implementation method of vehicle-mounted mobile self-organized network route is disclosed, may further comprise the steps: each intersection arranges node, source node can be transmitted by nearer node to highway section, own place one end distance from destination node when transmitting packet; Node is when transmitting packet, and whether at first judge has in the neighbor table apart from the nearer node of destination node, if having, then directly packet is transmitted to corresponding node; Otherwise selecting adjacent according to the highway section selection algorithm is not the highway section that has just received packet, and the highway section direction is near the highway section of destination node, specifies then that other end node is the highway section receiving terminal node on the road section selected; When routing node never received the same packet that the identical sources node sends with the highway section, selecting one, to receive the packet success rate higher, and time of delay short optimal path, forbid those non-optimum RX path simultaneously.Weak point is that function singleness does not have the location privacy protection function.
Summary of the invention
The present invention in the location privacy protection process for the vehicle-mounted self-organizing network that overcomes prior art, exists selfish vehicle uncooperative, causes the decline of vehicle location personal secrets; Perhaps the vehicle in the vehicle-mounted self-organizing network is frequently changed pseudo-the deficiency that the energy expense of bringing increases, and a kind of location privacy that can effectively protect vehicle is provided; Can impel more vehicles to participate in pseudo-name change, thereby significantly improve the vehicle location method for secret protection of vehicle-mounted self-organizing network of the location privacy fail safe of network.
To achieve these goals, the present invention is by the following technical solutions:
A kind of vehicle location method for secret protection of vehicle-mounted self-organizing network, described vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and described terminal comprises radio receiving transmitting module, microprocessor and memory; Described mobile node and several onboard servers wireless connections, onboard servers is connected by wireless mode or wired mode with Control Server; Comprise the steps:
(1-1) be provided with the Mixed Zone criterion of vehicle i in onboard servers, the Mixed Zone criterion is for to have at least in the Mixed Zone of vehicle i
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T is the life cycle of pseudo-name, and Δ t is the change threshold value of pseudo-name; P
ChpBe the probability of the pseudo-name of each car change in the Mixed Zone, DL
i(t) the vehicle location privacy threshold value for setting; K is pseudo-name change number of times;
By DL
i(t), P
ChpDetermine, for example: DL
i(t)=2, P
Chp=0.5, then
Numerical value relevant with location privacy with the fame of the vehicle in the Mixed Zone of the fame of vehicle i, vehicle i.
Being provided with the location privacy model in terminal is:
In terminal, be provided with reputation model:
After changing pseudo-name through k time, the fame of vehicle i;
Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR
i(t);
(1-2) before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key is right, with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
(1-3) microprocessor of vehicle i calculates the pseudo-remaining time of vehicle i
When
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
(1-4) receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering;
(1-5) other vehicle outside the vehicle i in the setting vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame
The microprocessor of vehicle j calculates the location privacy B of vehicle j
j(t), and
And B
j(t) be stored in the memory of vehicle j;
(1-6) in vehicle j drops on the Mixed Zone of vehicle i and
And the current fame of vehicle j
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
And the location privacy B of vehicle j
j(t)<DL
j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
With location privacy B
j(t), and
And B
j(t) be stored in the memory of vehicle j;
(1-7) receive orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i as vehicle j, then vehicle j abandons command message COMMAND.
Because in the Mixed Zone, the pseudo-name of replacing can lose a false name certificate and produce extra energy expense, for selfish vehicle, can select the uncooperative puppet name of namely not changing to realize the number one maximization.If lack correct effectively excitation and penalty mechanism in the system, selfish vehicle will consider self privacy maximization, causes initiatively not changing pseudo-name.And pseudo-name is about to overdue vehicle, then must change pseudo-name in the Mixed Zone, and is uncooperative if other vehicles are all selected, and the assailant is easy to infer the mapping relations between the new and old pseudo-name that this vehicle.
At the problems referred to above, the present invention at first sets the privacy model for assessment of the current location privacy of different vehicle, is used for reflection when reputation model and the Mixed Zone criterion of the degree of cooperation of vehicle in front.
Whether any vehicle in the vehicle-mounted self-organizing network of the present invention determines whether in the Mixed Zone of vehicle i that according to the current fame of the vehicle i that sends pseudo-name request and from car the pseudo-name of cooperation change protects vehicle i; And can be according to dynamically adjust the fame from car from the current location privacy of car, a pseudo-remaining time.
Simulation result shows that vehicle-mounted self-organizing network location privacy protection method of the present invention can significantly reduce energy expense when the current location privacy that satisfies the protection vehicle requires.Simultaneously, because the introducing of fame makes more vehicle participate in pseudo-name change, thus the fail safe that improves the location privacy of whole vehicle-mounted self-organizing network.
As preferably, step (1-4) also comprises the steps:
Receive the pseudo-name request message RNP of vehicle i when onboard servers after, receive pseudo-name request message RNP that vehicle j sends and vehicle j again in the Mixed Zone of vehicle i, then onboard servers abandons the pseudo-name request message RNP of the vehicle j that receives.
As preferably, the pseudo-name request message RNP in the described step (1-3) comprises the remaining time of current pseudo-name
New pseudo-name, fame
The fame threshold DR
i(t), current location and the speed of a motor vehicle.
As preferably, the command message COMMAND in the described step (1-4) comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change
With the fame threshold DR
i(t).
As preferably, the pseudo-name request message RNP in the described step (1-3) adopts a broadcast encryption method to encrypt.
As preferably, the message COMMAND in the described step (1-4) adopts broadcast encryption method to encrypt.
As preferably, Δ T is 5 minutes to 30 minutes.
As preferably, Δ t is 1 second to 45 seconds.
Therefore, the present invention has following beneficial effect: (1) can significantly reduce energy expense when the current location that satisfies the protection vehicle requires; (2) more vehicles participate in pseudo-name change, and the location privacy fail safe of onboard wireless network is higher.
Description of drawings
Fig. 1 is a kind of location privacy illustraton of model of vehicle i of the present invention;
Fig. 2 is a kind of flow chart of the present invention;
Fig. 3 is mean place privacy of the present invention and pseudo-name life cycle Δ T graph of a relation;
Fig. 4 is average energy expense and pseudo-name life cycle Δ T graph of a relation;
Fig. 5 is average energy expense and location privacy threshold value graph of a relation;
Fig. 6 is mean place privacy and popularity threshold value graph of a relation.
Embodiment
The present invention will be further described below in conjunction with the drawings and specific embodiments.
Embodiment as described in Figure 2 is a kind of vehicle location method for secret protection of vehicle-mounted self-organizing network, and vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and terminal comprises radio receiving transmitting module, microprocessor and memory; Microprocessor is electrically connected with radio receiving transmitting module and memory respectively; Mobile node and 4 onboard servers wireless connections, onboard servers is connected by wireless mode with Control Server; Comprise the steps:
Step 100 is provided with the Mixed Zone criterion of vehicle i for to have at least in the Mixed Zone of vehicle i in onboard servers
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
Span be:
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T=25 minute, Δ t=0.5 minute; P
Chp=0.5, DL
i(t)=2.0; K=50;
Be provided with location privacy model as shown in Figure 1 in terminal, the location privacy model is:
In terminal, be provided with reputation model:
After changing pseudo-name through k time, the fame of vehicle i;
Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR
i(t) be 2.0;
Step 200, before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key to with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
Step 300, the microprocessor of vehicle i are calculated the pseudo-remaining time of vehicle i
When
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
Step 400, receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering; Pseudo-name request message RNP comprises the remaining time of current pseudo-name
New pseudo-name, fame
The fame threshold DR
i(t), current location and the speed of a motor vehicle.
Step 500, other vehicle of setting outside the vehicle i in the vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame
The microprocessor of vehicle j calculates the location privacy B of vehicle j
j(t), and
And B
j(t) be stored in the memory of vehicle j;
Command message COMMAND comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change
With the fame threshold DR
i(t).
Step 600, in vehicle j drops on the Mixed Zone of vehicle i and
And the current fame of vehicle j
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
And the location privacy B of vehicle j
j(t)<DL
j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
With location privacy B
j(t), and
And B
j(t) be stored in the memory of vehicle j;
Step 700, when vehicle j receives orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i, then vehicle j abandons command message COMMAND.
Below be Simulation results:
The configuration of emulation experiment sees Table 1, and vehicle operating is at the rural road in 2 tracks, and Vehicle Speed is limited in 40 kilometers/hour to 80 kilometers/hour, and the communication radius of vehicle is 250 meters, and Δ t is 0.5 minute.
The configuration of table 1 experiment parameter
Parameter | Numerical value |
The |
2 tracks |
Lane width | 3.5 rice |
The shortest |
5 meters |
Travel speed | [40 kilometers/hour 80 kilometers/hour] |
The vehicle communication radius | 250 meters |
Send a RNP energy expense | 1mJ |
The pseudo-name of change energy expense once | 0.1mJ |
Δt | 0.5 second |
k | 50 |
Fig. 3 represents the mean place privacy of vehicle and the relation between the pseudo-name life cycle Δ T.Wherein, the Swap method, be the location privacy of certain vehicle less than remaining time of location privacy threshold value or pseudo-name during less than Δ t, this vehicle enters pseudo-name change procedure.
The Non-Reputation method is that then this vehicle is not changed pseudo-name if the location privacy of certain vehicle satisfies the location privacy threshold value in the Mixed Zone.Location privacy threshold value DL in the present embodiment
i(t) be log
2(5), popularity threshold DR
i(t) be 2.0.
As shown in Figure 3, the location privacy of the present invention and Swap method will be higher than location privacy threshold value log
2And the location privacy value of Non-Reputation method remains on 2.3 (5).Its reason is: in the Non-Reputation method, do not change pseudo-name in case selfish vehicle satisfies the location privacy threshold value, make the location privacy value of vehicle i descend, thereby cause the mean place privacy of whole system to descend.
In addition, as shown in Figure 3, the life cycle of pseudo-name is little to the influence of mean place privacy, and its reason is if the remaining time of pseudo-name
All vehicles are all changed pseudo-name.
Fig. 4 has provided the average energy expense of system and the relation between the pseudo-name life cycle.Wherein, location privacy threshold value DL
i(t) be log
2(5), DR
i(t) the popularity threshold value is 2.0.
As shown in Figure 4, energy expense of the present invention is about 2.5mJ, and the Swap method is about 37mJ, and its main cause is to compare with the Swap method, and the present invention has reduced pseudo-name change number of times.Compare with the present invention, the Non-Reputation method makes more vehicle send RNP message, thereby causes energy expense bigger than the present invention because the mean place privacy is low.
Table 2 provides the mean place privacy of three kinds of methods of diverse location privacy threshold value.Compare with the Swap method, the present invention does not cause the mean place privacy low because selfish vehicle is not initiatively changed pseudo-name, but the present invention can meet the location privacy threshold value of vehicle.Compare with the Non-Reputation method, the present invention makes the mean place privacy increase owing to introduce the popularity incentive measure.
Concern between table 2 mean place privacy and the threshold value
Fig. 5 represents the relation between average energy expense and the location privacy threshold value.As shown in Figure 5, the average energy expense of the present invention and Non-Reputation method increases along with the increase of location privacy threshold value, and the Swap method is opposite.Its reason is as follows: when the Mixed Zone hour, thereby vehicle is difficult to reach the location privacy threshold value and constantly sends RNP message and require to enter pseudo-name change procedure in the Swap method; And in the present invention and the Non-Reputation method, because the pseudo-name of the inner separating vehicles change in Mixed Zone, along with the location privacy threshold value increases, more vehicle need be changed pseudo-name and satisfy the location privacy threshold value.
Fig. 6 has provided the relation between mean place privacy and the popularity threshold value.
As shown in Figure 6, along with the increase of popularity threshold value, mean place privacy of the present invention also increases thereupon.This causes more vehicle need pass through the fame of the pseudo-name ability of change raising itself mainly due to the increase of popularity threshold value.
Should be understood that present embodiment only to be used for explanation the present invention and be not used in and limit the scope of the invention.Should be understood that in addition those skilled in the art can make various changes or modifications the present invention after the content of having read the present invention's instruction, these equivalent form of values fall within the application's appended claims institute restricted portion equally.
Claims (8)
1. the vehicle location method for secret protection of a vehicle-mounted self-organizing network, described vehicle-mounted self-organizing network will be located at terminal on the automobile as mobile node, and described terminal comprises radio receiving transmitting module, microprocessor and memory; Described mobile node and several onboard servers wireless connections, onboard servers is connected by wireless mode or wired mode with Control Server; It is characterized in that, comprise the steps:
(1-1) be provided with the Mixed Zone criterion of vehicle i in onboard servers, the Mixed Zone criterion is for to have at least in the Mixed Zone of vehicle i
Car; Wherein, i is the numbering of any vehicle in the vehicle-mounted self-organizing network;
The Δ T of k Δ T-Δ t≤t<(k+1); Δ T is the life cycle of pseudo-name, and Δ t is the change threshold value of pseudo-name; P
ChpBe the probability of the pseudo-name of each car change in the Mixed Zone, DL
i(t) the vehicle location privacy threshold value for setting; K is pseudo-name change number of times;
Being provided with the location privacy model in terminal is:
In terminal, be provided with reputation model:
After changing pseudo-name through k time, the fame of vehicle i;
Be vehicle fleet in the Mixed Zone; Setting the fame threshold value is DR
i(t);
(1-2) before vehicle i enters vehicle-mounted self-organizing network first, to Control Server registration obtain public, private key is right, with public, private key to corresponding certificate; The initial fame of setting vehicle i is 0, and the initial position privacy of vehicle i is 2;
(1-3) microprocessor of vehicle i calculates the pseudo-remaining time of vehicle i
When
Pseudo-name request message RNP after encryption of vehicle i transmission is to onboard servers;
(1-4) receive pseudo-name request message RNP after, onboard servers is set up the Mixed Zone that criterion is set up vehicle i according to the Mixed Zone, the command message COMMAND behind the onboard servers broadcast enciphering;
(1-5) other vehicle outside the vehicle i in the setting vehicle self-organizing network is vehicle j, as the vehicle j message COMMAND that receives orders, the microprocessor of vehicle j compares with Mixed Zone size and location information among the command message COMMAND that receives with from the car present position, in vehicle j drops on the Mixed Zone of vehicle i, vehicle j broadcasting command message COMMAND; When
Then vehicle j change is pseudo-; The microprocessor of vehicle j utilizes reputation model to calculate its fame
The microprocessor of vehicle j calculates the location privacy B of vehicle j
j(t), and
And B
j(t) be stored in the memory of vehicle j;
(1-6) in vehicle j drops on the Mixed Zone of vehicle i and
And the current fame of vehicle j
Then vehicle j change is pseudo-; In vehicle j drops on the Mixed Zone of vehicle i and
And the location privacy B of vehicle j
j(t)<DL
j(t), then vehicle j changes pseudo-name; The microprocessor of vehicle j calculates the fame of vehicle j
With location privacy B
j(t), and
And B
j(t) be stored in the memory of vehicle j;
(1-7) receive orders message COMMAND and vehicle j not in the Mixed Zone of vehicle i as vehicle j, then vehicle j abandons command message COMMAND.
2. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, step (1-4) also comprises the steps:
Receive the pseudo-name request message RNP of vehicle i when onboard servers after, receive the pseudo-name request message RNP that vehicle j sends again, and vehicle j is in the Mixed Zone of vehicle i, then onboard servers abandons the pseudo-name request message RNP of the vehicle j that receives.
3. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the pseudo-name request message RNP in the described step (1-3) comprises the remaining time of current pseudo-name
New pseudo-name, fame
The fame threshold DR
i(t), current location and the speed of a motor vehicle.
4. vehicle-mounted self-organizing network location privacy protection method according to claim 1 is characterized in that, the command message COMMAND in the described step (1-4) comprises position, Mixed Zone, the Mixed Zone size of vehicle i, time, the fame of the pseudo-name of vehicle change
With the fame threshold DR
i(t).
5. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the pseudo-name request message RNP in the described step (1-3) adopts broadcast encryption method to encrypt.
6. the vehicle location method for secret protection of vehicle-mounted self-organizing network according to claim 1 is characterized in that, the message COMMAND in the described step (1-4) adopts broadcast encryption method to encrypt.
7. according to the vehicle location method for secret protection of claim 1 or 2 or 3 or 4 or 5 or 6 described vehicle-mounted self-organizing networks, it is characterized in that Δ T is 5 minutes to 30 minutes.
8. according to the vehicle location method for secret protection of claim 1 or 2 or 3 or 4 or 5 or 6 described vehicle-mounted self-organizing networks, it is characterized in that Δ t is 1 second to 45 seconds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310182137.9A CN103338444B (en) | 2013-05-15 | 2013-05-15 | The vehicle position privacy protection method of vehicular ad hoc network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310182137.9A CN103338444B (en) | 2013-05-15 | 2013-05-15 | The vehicle position privacy protection method of vehicular ad hoc network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103338444A true CN103338444A (en) | 2013-10-02 |
CN103338444B CN103338444B (en) | 2015-11-04 |
Family
ID=49246526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310182137.9A Expired - Fee Related CN103338444B (en) | 2013-05-15 | 2013-05-15 | The vehicle position privacy protection method of vehicular ad hoc network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103338444B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812354A (en) * | 2016-03-07 | 2016-07-27 | 江苏大学 | LBS-based anti-attack location privacy protection method for IoV |
CN106911670A (en) * | 2017-01-13 | 2017-06-30 | 重庆邮电大学 | Intimacy protection system and method in a kind of car networking |
CN107580048A (en) * | 2017-09-04 | 2018-01-12 | 东北大学 | A kind of VANETs location privacy protection system and methods based on virtual Mix zone |
CN107947942A (en) * | 2017-11-30 | 2018-04-20 | 安徽大学 | Vehicle position privacy protection method based on group ranking and prestige |
CN108476403A (en) * | 2016-02-26 | 2018-08-31 | 慧与发展有限责任合伙企业 | Equipment secret protection |
CN108616813A (en) * | 2018-03-22 | 2018-10-02 | 大连理工大学 | A kind of car networking location privacy protection scheme based on mixed zone |
CN109089241A (en) * | 2018-10-24 | 2018-12-25 | 常熟理工学院 | A kind of data communication implementation method of vehicle-mounted net |
CN111465010A (en) * | 2020-04-08 | 2020-07-28 | 南京大学 | Method for protecting vehicle position privacy in cooperative driving |
US10993108B2 (en) | 2015-03-17 | 2021-04-27 | Nokia Technologies Oy | Wireless routing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040224664A1 (en) * | 2003-05-07 | 2004-11-11 | Nokia Corporation | Mobile user location privacy solution based on the use of multiple identities |
CN102740286A (en) * | 2012-05-23 | 2012-10-17 | 杨涛 | Floating vehicle-based traceability vehicle self-networking communication privacy protection method |
CN102907151A (en) * | 2010-06-01 | 2013-01-30 | 微软公司 | Hybrid mobile phone geopositioning |
CN102904896A (en) * | 2012-10-23 | 2013-01-30 | 大连理工大学 | Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology |
-
2013
- 2013-05-15 CN CN201310182137.9A patent/CN103338444B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040224664A1 (en) * | 2003-05-07 | 2004-11-11 | Nokia Corporation | Mobile user location privacy solution based on the use of multiple identities |
CN102907151A (en) * | 2010-06-01 | 2013-01-30 | 微软公司 | Hybrid mobile phone geopositioning |
CN102740286A (en) * | 2012-05-23 | 2012-10-17 | 杨涛 | Floating vehicle-based traceability vehicle self-networking communication privacy protection method |
CN102904896A (en) * | 2012-10-23 | 2013-01-30 | 大连理工大学 | Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10993108B2 (en) | 2015-03-17 | 2021-04-27 | Nokia Technologies Oy | Wireless routing |
CN108476403A (en) * | 2016-02-26 | 2018-08-31 | 慧与发展有限责任合伙企业 | Equipment secret protection |
CN105812354A (en) * | 2016-03-07 | 2016-07-27 | 江苏大学 | LBS-based anti-attack location privacy protection method for IoV |
CN105812354B (en) * | 2016-03-07 | 2019-01-18 | 江苏大学 | Location privacy protection method based on attack resistance in car networking under a kind of LBS background |
CN106911670A (en) * | 2017-01-13 | 2017-06-30 | 重庆邮电大学 | Intimacy protection system and method in a kind of car networking |
CN106911670B (en) * | 2017-01-13 | 2020-09-29 | 重庆邮电大学 | Privacy protection system and method in Internet of vehicles |
WO2019041896A1 (en) * | 2017-09-04 | 2019-03-07 | 东北大学 | Virtual mix-zone-based vanet position privacy protection system and method |
CN107580048A (en) * | 2017-09-04 | 2018-01-12 | 东北大学 | A kind of VANETs location privacy protection system and methods based on virtual Mix zone |
CN107947942B (en) * | 2017-11-30 | 2019-08-27 | 安徽大学 | Vehicle position privacy protection method based on group ranking and prestige |
CN107947942A (en) * | 2017-11-30 | 2018-04-20 | 安徽大学 | Vehicle position privacy protection method based on group ranking and prestige |
CN108616813A (en) * | 2018-03-22 | 2018-10-02 | 大连理工大学 | A kind of car networking location privacy protection scheme based on mixed zone |
CN109089241A (en) * | 2018-10-24 | 2018-12-25 | 常熟理工学院 | A kind of data communication implementation method of vehicle-mounted net |
CN109089241B (en) * | 2018-10-24 | 2020-12-04 | 常熟理工学院 | Data communication implementation method for vehicle-mounted network |
CN111465010A (en) * | 2020-04-08 | 2020-07-28 | 南京大学 | Method for protecting vehicle position privacy in cooperative driving |
CN111465010B (en) * | 2020-04-08 | 2021-07-30 | 南京大学 | Method for protecting vehicle position privacy in cooperative driving |
Also Published As
Publication number | Publication date |
---|---|
CN103338444B (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103338444B (en) | The vehicle position privacy protection method of vehicular ad hoc network | |
CN107733459A (en) | The vehicle-mounted T Box to be communicated based on DSRC and low-altitude satellite and its application | |
Rawat et al. | Vehicular cyber physical systems | |
CN104537852B (en) | A kind of road burst accident reminding method collaborative based on bus or train route | |
Boualouache et al. | S2si: A practical pseudonym changing strategy for location privacy in vanets | |
Chen et al. | Broadcasting safety information in vehicular networks: issues and approaches | |
Popescu-Zeletin et al. | Vehicular-2-X communication: state-of-the-art and research in mobile vehicular ad hoc networks | |
CN102625237B (en) | Method for selecting optimum relay in communication between wayside device and vehicle | |
Shen et al. | Cooperative message authentication in vehicular cyber-physical systems | |
CN103338436B (en) | The pseudo-name change method of vehicle of vehicular ad hoc network | |
Fogue et al. | Securing warning message dissemination in VANETs using cooperative neighbor position verification | |
Rawat et al. | Securing vehicular ad-hoc networks against malicious drivers: A probabilistic approach | |
Sou | Modeling emergency messaging for car accident over dichotomized headway model in vehicular ad-hoc networks | |
CN108346318A (en) | A kind of control method and device of car networking communication | |
Noori et al. | A connected vehicle based traffic signal control strategy for emergency vehicle preemption | |
Souza et al. | Decreasing greenhouse emissions through an intelligent traffic information system based on inter-vehicle communication | |
Lyu et al. | Fine-grained TDMA MAC design toward ultra-reliable broadcast for autonomous driving | |
Sharma et al. | A survey: Issues and challenges of vehicular ad hoc networks (VANETs) | |
CN111447591A (en) | Vehicle networking data exchange method based on block chain | |
CN103428688A (en) | Continuous location-based service privacy protection method for vehicle-mounted self-organizing network | |
Al-Ani et al. | Adjusted location privacy scheme for VANET safety applications | |
CN108040327A (en) | Message relay method, car-mounted terminal, automobile and intelligent transport system | |
Benaidja et al. | An optimal broadcast of warning messages in vehicular ad hoc networks | |
Sireesha et al. | A survey of VANET Security models and its issues on node level data transmission | |
Eckhoff et al. | SmartRevoc: An efficient and privacy preserving revocation system using parked vehicles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20151104 Termination date: 20170515 |