CN107947942B - Vehicle position privacy protection method based on group ranking and prestige - Google Patents
Vehicle position privacy protection method based on group ranking and prestige Download PDFInfo
- Publication number
- CN107947942B CN107947942B CN201711234735.0A CN201711234735A CN107947942B CN 107947942 B CN107947942 B CN 107947942B CN 201711234735 A CN201711234735 A CN 201711234735A CN 107947942 B CN107947942 B CN 107947942B
- Authority
- CN
- China
- Prior art keywords
- vehicle
- group
- assumed name
- message
- leader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1051—Group master selection mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
Abstract
The vehicle position privacy protection method based on group ranking and prestige that the invention discloses a kind of, including the following contents: more vehicle cooperations being encouraged to form the reputation model of group;Assess the privacy model of vehicle location privacy intensity;The formation of group creates a mechanism with dynamic mixing zone domain;Assumed name replaces mechanism.For any vehicle in vehicular ad hoc network network, when its assumed name is when the phase, according to the credit value of itself, actively group is established to control server request, control server is request vehicle allocation group role of leaders, and according to the current location of request vehicle, one Mixed Zone of dynamic formation, other vehicles in Mixed Zone change assumed name to determine whether participating in cooperation according to the credit value of oneself, privacy intensity, assumed name remaining time, and can dynamically adjust the credit value of vehicle.The present invention can encourage more vehicles that group is added, to cooperate to change assumed name, guarantee vehicle location privacy;Meanwhile vehicle does not have to keep silent status in the Mixed Zone of formation, but with group's identity broadcast message, ensure the driving safety of vehicle;Furthermore it is possible to efficiently reduce resource overhead caused by non-essential frequent change assumed name.
Description
Technical field
The present invention relates to car networking field of communication security, and in particular to a kind of vehicle location based on group ranking and prestige is hidden
Private guard method.
Background technique
In recent years, vehicular ad hoc network has become the promising skill of the efficiency and level of security that improve transportation system
Art project and the extensive concern for causing the public.In vehicular ad hoc network, each vehicle is communicated equipped on board unit (OBU)
Equipment allows them not only to communicate with one another, i.e., vehicle is communicated with vehicle (V2V), and allow itself and roadside infrastructure into
Row communication, i.e., vehicle is communicated with infrastructure (V2I);Meanwhile vehicle is equipped with microprocessor unit, has certain calculating energy
Power.Vehicle periodically broadcasts the message to surrounding vehicles, including position, speed, directional information, is perceived with improving vehicle to surrounding vehicles
Degree, and the appearance of early warning dangerous situation.It is stolen however, these message can be intercepted easily by attacker, attacker utilizes
These message stolen track vehicle, to cause to seriously threaten to vehicle location privacy.
To solve this problem, some scholars propose the scheme for establishing Mixed Zone, carry out location privacy protection, lead to
Often, Mixed Zone is to be set to basis with fixed bit, is stopped using specific region as Mixed Zone, such as intersection or large size
Parking lot.Vehicle changes assumed name in the area, to prevent attacker from tracking them.However, fixed Mixed Zone is due to its position
The limitation set, vehicle must keep silent status in the region, be difficult meet the needs of flexibility.Therefore, dynamic creation is mixed
The thought for closing region is suggested, to expedite the emergence of out the assumed name change technique for being dynamically determined mixed zone.Pass through dynamic mixing zone domain side
Method, vehicle can change assumed name with dynamic select position.Such as there is scholar to propose the dynamic position privacy mode based on density, appoint
K-1 vehicle is must satisfy around meaning vehicle, it is desirable that other vehicles are cooperated to change assumed name together.However, certain selfishnesses
The considerations of vehicle is for number one (such as limited assumed name, bandwidth) is reluctant to change assumed name, is difficult to meet k- anonymity
Demand causes the probability of the hidden exposure in the position of vehicle to greatly increase.In addition, vehicle is tracked in order to prevent, vehicle is in mixed zone
Silent status is generally kept in domain, i.e. vehicle does not broadcast the message externally, does not also receive message, causes very big prestige to traffic safety
The side of body.
Summary of the invention
Goal of the invention: it is an object of the invention to solve vehicle position privacy protection method in existing vehicular ad hoc network network to deposit
Defect is being obtained, the number of vehicles that such as cooperation changes assumed name is less, leads to location privacy safety reduction;It reduces simultaneously frequent non-
Necessary assumed name changes bring resource overhead, and more vehicle cooperations is encouraged to change assumed name, improves the location privacy peace of vehicle
Quan Xing;In addition, improving the defect that vehicle keeps silent status in Mixed Zone, vehicle can be broadcast the message with group's identity, be subtracted
The hidden danger caused by traffic safety is lacked.
Technical solution: a kind of vehicle position privacy protection method based on group ranking and prestige of the invention, need by
The group ranking mechanism more taken turns forms Mixed Zone to change the assumed name of vehicle, comprising the following steps:
(1) it is equipped in vehicular ad hoc network network and measures vehicle i location privacy strength model and credit value model;
Location privacy model are as follows:
Wherein, It is closed in the Mixed Zone that other vehicles are established for kth wheeled vehicle i
Make the number of vehicles of change assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle, △ T is assumed name life cycle,
△ t is that (△ t is less with respect to the time used in △ T, a settable time range, such as arrives for 1 second for change assumed name remaining time threshold value
30 seconds, can also therefrom appoint and take a value, such as 30 seconds), k is that assumed name changes number,It is vehicle i in the position that kth wheel obtains
Set privacy intensity;
Reputation model are as follows:It indicates to obtain by k assumed name change rear vehicle i is accumulative
Credit value, wherein NTi zFor vehicle fleet in Mixed Zone,It indicates to take turns the number of vehicles that cooperation changes assumed name, z in z
≤k;
N is equivalent to the effect of subscript value in above-mentioned model, range from 1 toAssuming that vehicle i is mixed in entrance in kth wheel
Closing the assumed name used before region is b, is had in the Mixed ZoneA vehicle more renews assumed name, and new assumed name is d, e, f,
G, then the new assumed name of vehicle i may be one in this 4 new assumed names, for attacker, successfully by new assumed name d and old vacation
Associated probability, that is, the P of name bb→d=1/4.Pb→dIn the different rounds for changing assumed name, numerical value is different, is not one solid
Definite value.
(2) when vehicular ad hoc network is added in vehicle for the first time, registered with the true identity of oneself to trust authority TA with obtain it is public/
Private key pair and its corresponding certificate;
(3) assume that the microprocessor of vehicle i calculates the assumed name remaining time of oneself in kth wheelWhenWhen,
Vehicle i serves as crowd leader GL to control server CS request;
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic;
(5) Mixed Zone is constructed in the region that vehicle i forms group, group members broadcast of the GL into Mixed Zone changes assumed name
Message, vehicle in Mixed Zone can be determined according to oneself assumed name remaining time, the credit value and location privacy intensity of itself
Whether participation cooperation changes assumed name.
Further, in the step (1), control server CS is that any vehicle in vehicular ad hoc network network is arranged one
Prestige threshold xi and location privacy intensity thresholdThe two threshold values think that privacy class to be achieved is set according to user oneself
Fixed, as user is to the difference of the setting of the two threshold values, the location privacy of acquisition can change therewith.
Further, when vehicular ad hoc network network is added in any vehicle of the step (2) for the first time, trust authority TA is the vehicle
Distribute a certain number of assumed names, each assumed name had accordingly using the time, so as to vehicle during traveling with pseudonym identity
It is sent out message, all message are intended to be encrypted or signed before transmitting.
Further, the detailed process of the step (3) are as follows:
(3.1) whenWhen, vehicle i sends message request to control server CS through roadside unit R SU and serves as group's neck
The person of leading GL includes vehicle i currently used assumed name, position, average speed and assumed name remaining time information in the message of transmission;
(3.2) control server CS receives the message of vehicle i, verifyingIt is whether true, in the side of trust authority TA
It helps down, sends response message to vehicle i using roadside unit RSU, which includes distributing to group's identity of vehicle i
GID, symmetric key kGAnd certificate, control server CS saved in local list simultaneously the assumed name of vehicle i, group's identity GID and
Certificate information;
(3.3) after vehicle i receives the response message of control server CS, asking from other vehicles is monitored with group's identity
Seek addition message.
Further, the detailed process of the step (4) are as follows:
(4.1) group leader GL periodically broadcasts group with group's identity GID and establishes message, and any vehicle j receives group's foundation
Message, judges whether oneself has been crowd leader, if it is, vehicle j, which abandons group, establishes message, otherwise, vehicle j continues to sentence
It is disconnected whether to receive the group from other crowd of leader GL and establish message, if it is, vehicle j equally abandons message, otherwise, vehicle
Credit value R of the j further according to group leader GLGL, itself assumed name remaining timeThe credit value R of itselfjWith location privacy intensity
BjTo determine whether the group that vehicle i is formed is added, become group members;This mode can effectively avoid one of group leader
The problem of being the member of another group, while the problem of avoid a vehicle while being added multiple groups.
(4.2) work as RGLWhen >=ξ, vehicle j sends the request that group is added to group leader GL;Work as RGL< ξ andWhen,
Vehicle j sends the request that group is added to group leader GL;Work as RGLWhen < ξ, if Rj< ξ andThen vehicle j is to group leader
GL sends the request that group is added;Otherwise, until vehicle j assumed name is when the phase, group's neck is served as to control server CS activly request
The person of leading;
Wherein, be added in the request message of group include current vehicle use assumed name, certificate,RjAnd Bj, group leader
After GL receives the request message of addition group, the identity information of vehicle j is saved, and send response message, the response message to vehicle j
Including GID, kGAnd certificate;After vehicle j receives response message, verifies group's identity and save kG;The vehicle in group will pass through k laterG
Coded communication, the vehicle in group are given out information to outside group with GID;It is the timeliness for guaranteeing message, every message in the above process
In include timestamp information.
Further, the detailed process of the step (5) are as follows:
(5.1) after group establishes, member at least NT in group is selectedi kThe critical zone of a vehicle size is as mixed zone
Domain, all vehicles in this region complete assumed name replacement as needed later, whereink△T-△t≤t<k△
T, PchpThe probability for changing assumed name for vehicle in Mixed Zone (such as may be set to 0.5, indicate any vehicle in other vehicles
There is 50% probability to change assumed name in Mixed Zone);It is that control server CS sets for any vehicle in vehicular ad hoc network network
The location privacy intensity threshold set;
(5.2) group leader GL sends message to control server CS by roadside unit RSU, which includes group's identity
GID and certificate, control server CS receive message and are verified, the group's identity that will be saved in group's identity GID and local list
GID is compared, and if it exists, proves that group leader GL is effectively, to reply response message to group leader GL, group is allowed to lead
Person GL and group members change assumed name as needed;
(5.3) group leader GL kGEncryption changes the message of assumed name and broadcast, and the group members decryption in Mixed Zone disappears
Breath, changes assumed name as needed;IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, vehicle
The R of jj< ξ andThen vehicle j equally calculates the credit value R of oneselfjWith location privacy intensity Bj, participate in cooperation and change
Assumed name;Otherwise, vehicle j keeps assumed name constant, until assumed name is near the phase, actively serves as to the request of CS control server in next round
Group leader;
(5.4) primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the mistake of next round
Journey.
The utility model has the advantages that compared with prior art, the invention has the following advantages that
(1) invention introduces group ranking mechanism, vehicle is broadcast the message in the process of moving with pseudonym identity, when vehicle from
Oneself forms group or when as the other crowd of member, assumed name can be replaced to broadcast the message with group's identity, it is quiet that vehicle does not have to holding
Silent state, reduction are threatened caused by traffic safety, and the vehicle in additional mixing region with group's identity broadcast message, enhances
The confusion of vehicle, to effectively resist the probability that attacker successfully tracks.
(2) invention introduces the incentive mechanisms of credit value, and prestige initial value is set when vehicular ad hoc network network has just been added in vehicle
It is 0, vehicle location personal secrets are relatively low at this time, and vehicle is to improve credit value, will play an active part in cooperation and change assumed name.?
During constantly participating in other vehicle cooperations change assumed name, credit value can constantly add up, when credit value reaches specified threshold
Value illustrates that it is already engaged in and assumed name is varied multiple times, personal secrets are ensured, may not necessarily participate in assumed name replacement later.
(3) present invention due to each car storage assumed name limitation, if frequently changing assumed name, quickly assumed name will by with
It is complete.Therefore, the vehicle in the present invention in Mixed Zone need not all change assumed name, when only meeting the condition specified in scheme
Just change assumed name, effectively reduces change assumed name bring resource overhead.
Detailed description of the invention
Fig. 1 is system model structure chart of the invention;
Fig. 2 is overall flow figure of the invention;
Fig. 3 is group's establishment process flow chart in the present invention;
Fig. 4 is that assumed name changes process flow diagram flow chart in the present invention.
Specific embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to the implementation
Example.
Embodiment 1:
As shown in Fig. 2, a kind of vehicle position privacy protection method based on group ranking and prestige of the invention, successively includes
Following steps:
(1) model for measuring vehicle i location privacy intensity is equipped in vehicular ad hoc network network are as follows:
Wherein, It is closed in the Mixed Zone that other vehicles are established for kth wheeled vehicle i
Make the number of vehicles of change assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle.
For example, the assumed name that vehicle uses before entering Mixed Zone is b, cooperation changes the vehicle of assumed name in Mixed Zone
Number is 6, and vehicle all continues to travel after leaving Mixed Zone with new assumed name, and the new assumed name of vehicle i may be new false for 6
One in name, i.e.,△ T is assumed name life cycle, is set as 25 minutes, and △ t is change assumed name remaining time threshold
Value, is set as 0.5 minute, and k is that assumed name changes number, is set as 30,It is strong for the location privacy that is obtained in kth wheeled vehicle i
Degree, value and t, k andIt is related.
It is equipped with the model for measuring vehicle credit value at the same time are as follows:It indicates passing through k
Secondary assumed name change rear vehicle i adds up the credit value obtained, wherein NTi zFor vehicle fleet in Mixed Zone.
(2) when vehicular ad hoc network is added in vehicle for the first time, with the true identity of oneself to TA register with obtain public private key-pair and
Its corresponding certificate, the initial position privacy intensity of setting vehicle i are 2, and initial credit value is 0.
(3) assume that the microprocessor of vehicle i calculates the assumed name remaining time of oneself in kth wheelWhenWhen,
Vehicle i is served as crowd leader (GL) to control server (CS) request, and CS is that the prestige threshold xi of each vehicle setting is 2.0, position
Set privacy threshold valueIt is 2.5.
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic.
(5) Mixed Zone is formed in group, group members broadcast of the GL into Mixed Zone changes assumed name message, Mixed Zone
Interior vehicle can decide whether that participating in cooperation changes according to oneself assumed name remaining time, the credit value and location privacy intensity of itself
Become assumed name.
Wherein assumed name life cycle, assumed name remaining time threshold value, location privacy intensity threshold can be with appropriate adjustment, mixed zones
Number of vehicles in domain can meet the eye on every side the requirement of privacy confusion by adjusting Mixed Zone size.
The specific implementation process of step (3) is as follows:
1. working as Ti leftWhen≤△ t, vehicle i sends message request to CS through roadside unit (RSU) and serves as GL, includes in message
Vehicle i currently used assumed name, position, average speed and assumed name remaining time information.
2.CS receives message, checks Ti leftWhether≤△ t is true, after being verified, with the help of TA, using RSU
Response message is sent to vehicle i, including group's identity (GID), the symmetric key (k for distributing to vehicle iG) and certificate, CS it is same
When locally save vehicle i assumed name, GID and certificate.
3. vehicle i is received and can be monitored the request addition from other vehicles with group's identity after the response message of CS and disappear
Breath.
As shown in figure 3, the specific implementation process of step (4) is as follows:
1.GL is periodically broadcasted group with GID and establishes message, and any vehicle j receives message, judge oneself whether be
Group leader;If it is vehicle j abandons message, and otherwise, vehicle j judges whether that receiving the group from other GL establishes message;
If it is vehicle j equally abandons message, otherwise, credit value (R of the vehicle j further according to group leaderGL), itself assumed name residue when
BetweenCredit value (the R of itselfj) and location privacy intensity (Bj) to determine whether the group that vehicle i is formed is added, become group
Member.
2. working as RGLWhen >=ξ, otherwise vehicle j works as R to the request that GL sends addition groupGLWhen < ξ, ifVehicle j
Otherwise the request for sending addition group to GL works as RGLWhen < ξ, if Rj< ξ andVehicle j sends to GL and asking for group is added
It asks, otherwise, until vehicle j assumed name is when the phase, serves as crowd leader to CS activly request.
Wherein be added group message in include current vehicle use assumed name, certificate,RjAnd Bj, GL, which is received, is added group
Message, save vehicle j identity information, and to vehicle j send response message include GID, kG, certificate.Vehicle j receives response
After message, verifies group's identity and save kG.The vehicle in group can pass through k laterGCoded communication, the vehicle in group is to outside group
It is given out information with GID.It all include timestamp information in every message in addition, the timeliness in order to guarantee message.
As shown in figure 4, the specific implementation process of step (5) is as follows:
1. selecting member at least NT in group after group foundationi kThe critical zone of a vehicle is as Mixed Zone, Zhi Hou
All vehicles in the region complete assumed name replacement as needed, whereinK △ T- △ t≤t < k △ T, PchpFor
Vehicle changes the probability of assumed name in Mixed Zone, and P is arrangedchp=0.5.
2.GL sends message to CS by RSU, including GID, certificate, CS receive message and be verified, by GID and local
The GID saved in list is compared, and if it exists, proves that GL is effectively, to reply response message to GL, allow GL and group members
Change assumed name as needed.
3.GL kGEncryption changes the message of assumed name and broadcast, and the group members in Mixed Zone decrypt message, as needed
Change assumed name.IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, the R of vehicle jj< ξ andThen vehicle j equally calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, vehicle j keeps assumed name constant, directly
To assumed name near the phase, crowd leader actively is served as to CS request in next round.
4. primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the process of next round.
It can be seen from above-described embodiment that the present invention uses credit mechanism, more vehicle cooperations is encouraged to change assumed name,
The confusion for considerably increasing vehicle, has been effectively ensured the location privacy of vehicle, while it is false to reduce non-essential forcibly changing
The wasting of resources caused by name.In addition, the present invention, according to vehicle space distribution characteristics, vehicle forms mixed zone in a manner of group ranking
Domain, vehicle replaces assumed name to send message in group with group's identity, can effectively reduce the probability that vehicle is tracked, and maintains higher
Privacy performance.Vehicle need not keep silent status in group simultaneously, can effectively ensure that the safety of vehicle in the process of moving.
Claims (3)
1. a kind of vehicle position privacy protection method based on group ranking and prestige, it is characterised in that: the following steps are included:
(1) it is equipped in vehicular ad hoc network network and measures vehicle i location privacy strength model and credit value model;
Location privacy model are as follows:
Wherein, Cooperate to change in the Mixed Zone that other vehicles are established for kth wheeled vehicle i
Become the number of vehicles of assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle, and△ T is assumed name
Life cycle, △ t are change assumed name remaining time threshold value, and k is that assumed name changes number,It is obtained for vehicle i in kth wheel
Location privacy intensity;
Reputation model are as follows:It indicates by the k accumulative acquisition of assumed name change rear vehicle i
Credit value, wherein NTi zFor vehicle fleet in Mixed Zone;It indicates to take turns the number of vehicles that cooperation changes assumed name, z≤k in z;
(2) it when vehicular ad hoc network is added in vehicle for the first time, is registered with the true identity of oneself to trust authority TA to obtain public/private key pair
Pair and its corresponding certificate;
(3) assume in kth wheel, the microprocessor of vehicle i calculates respectively oneself assumed name remaining time Ti left, work as Ti left≤△t
When, vehicle i serves as crowd leader GL to control server CS request;
(3.1) work as Ti leftWhen≤△ t, vehicle i sends message request to control server CS through roadside unit R SU and serves as group leader
Person GL includes vehicle i currently used assumed name, position, average speed and assumed name remaining time information in the message of transmission;
(3.2) control server CS receives the message of vehicle i, verifies Ti leftWhether≤△ t is true, in the help of trust authority TA
Under, using roadside unit RSU to vehicle i send response message, the response message include distribute to group's identity GID of vehicle i,
Symmetric key kGAnd certificate, control server CS save assumed name, group's identity GID and the certificate of vehicle i in local list simultaneously
Information;
(3.3) after vehicle i receives the response message of control server CS, the request from other vehicles is monitored with group's identity and is added
Enter message;
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic;
(4.1) group leader GL periodically broadcasts group with group's identity GID and establishes message, and any vehicle j receives group and establishes message,
Judge whether oneself has been crowd leader, if it is, vehicle j, which abandons group, establishes message, otherwise, vehicle j, which continues judgement, is
No to receive the group from other crowd of leader GL and establish message, if it is, vehicle j equally abandons message, otherwise, vehicle j is again
According to the credit value R of group leader GLGL, itself assumed name remaining timeThe credit value R of itselfjWith location privacy intensity BjCome
Judge whether that the group that vehicle i is formed is added, becomes group members;
(4.2) work as RGLWhen >=ξ, vehicle j sends the request that group is added to group leader GL;Work as RGL< ξ andWhen, vehicle j
The request that group is added is sent to group leader GL;Work as RGLWhen < ξ, if Rj< ξ andThen vehicle j is sent to group leader GL
The request of group is added;Otherwise, until vehicle j assumed name is when the phase, crowd leader, ξ are served as to control server CS activly request
For prestige threshold value,For location privacy intensity threshold;
Wherein, be added in the request message of group include current vehicle use assumed name, certificate,RjAnd Bj, group leader GL receipts
To after being added the request message of group, the identity information of vehicle j is saved, and send response message to vehicle j, which includes
GID、kGAnd certificate;After vehicle j receives response message, verifies group's identity and save kG;The vehicle in group will pass through k laterGEncryption
It communicates, the vehicle in group is given out information to outside group with GID;
(5) Mixed Zone is constructed in the region that vehicle i forms group, group members broadcast of the GL into Mixed Zone changes assumed name and disappears
Breath, vehicle in Mixed Zone can be according to oneself assumed name remaining time, credit value and location privacy the intensity judgement of itself
No participation cooperation changes assumed name;
(5.1) after group establishes, member at least NT in group is selectedi kThe critical zone of a vehicle size as Mixed Zone, it
All vehicles in this region complete assumed name replacement as needed afterwards, whereinK △ T- △ t≤t < k △ T, Pchp
Change the probability of assumed name for vehicle in Mixed Zone;It is that control server CS is arranged for any vehicle in vehicular ad hoc network network
Location privacy intensity threshold;
(5.2) group leader GL sends message to control server CS by roadside unit RSU, which includes group's identity GID
And certificate, control server CS receive message and are verified, the group's identity GID that will be saved in group's identity GID and local list
It is compared, and if it exists, prove that group leader GL is effectively, to reply response message to group leader GL, allow group leader
GL and group members change assumed name as needed;
(5.3) group leader GL kGEncryption changes the message of assumed name and broadcast, and the group members in Mixed Zone decrypt message, root
According to needing to change assumed name;IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, the R of vehicle jj
< ξ andThen vehicle j equally calculates the credit value R of oneselfjWith location privacy intensity Bj, participate in cooperation and change assumed name;It is no
Then, vehicle j keeps assumed name constant, until assumed name is near the phase, actively serves as group leader to the request of CS control server in next round
Person;
(5.4) primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the process of next round.
2. the vehicle position privacy protection method according to claim 1 based on group ranking and prestige, it is characterised in that: institute
It states in step (1), control server CS is that prestige threshold xi and location privacy intensity is arranged in any vehicle in vehicular ad hoc network network
Threshold value
3. the vehicle position privacy protection method according to claim 1 based on group ranking and prestige, it is characterised in that: institute
When stating any vehicle of step (2) vehicular ad hoc network network being added for the first time, trust authority TA is a certain number of assumed names of the vehicle allocation,
Each assumed name has accordingly using time △ T, so that vehicle is sent out message during traveling with pseudonym identity, owns
Message is intended to be encrypted or signed before transmitting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711234735.0A CN107947942B (en) | 2017-11-30 | 2017-11-30 | Vehicle position privacy protection method based on group ranking and prestige |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711234735.0A CN107947942B (en) | 2017-11-30 | 2017-11-30 | Vehicle position privacy protection method based on group ranking and prestige |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107947942A CN107947942A (en) | 2018-04-20 |
CN107947942B true CN107947942B (en) | 2019-08-27 |
Family
ID=61947917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711234735.0A Active CN107947942B (en) | 2017-11-30 | 2017-11-30 | Vehicle position privacy protection method based on group ranking and prestige |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107947942B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107580048B (en) * | 2017-09-04 | 2020-07-14 | 东北大学 | VANETs position privacy protection system and method based on virtual Mix-zone |
CN108769926B (en) * | 2018-05-16 | 2020-10-23 | 电子科技大学 | Group perception layer-based car networking privacy protection method and car networking framework |
CN109561383A (en) * | 2018-12-17 | 2019-04-02 | 昆明理工大学 | A kind of location privacy protection method based on dynamic assumed name exchange area |
CN110034958B (en) * | 2019-04-02 | 2022-11-11 | 浙江工商大学 | Vehicle networking pseudonym change incentive algorithm and change method based on SGUM theory |
CN110430567B (en) * | 2019-07-31 | 2023-03-24 | 福建师范大学 | Internet of vehicles pseudonym replacement method based on game analysis |
US11240659B2 (en) * | 2019-12-09 | 2022-02-01 | Intel Corporation | Privacy protection mechanisms for connected vehicles |
CN112351408B (en) * | 2021-01-08 | 2021-04-06 | 北京电信易通信息技术股份有限公司 | Data safety transmission method and system for intelligent network-connected electric vehicle |
CN112969173B (en) * | 2021-02-01 | 2022-08-30 | 河南工学院 | Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle |
CN114051235B (en) * | 2021-08-28 | 2024-03-29 | 北京工业大学 | Vehicle track privacy protection method in Internet of vehicles scene |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338444A (en) * | 2013-05-15 | 2013-10-02 | 浙江工商大学 | Vehicle position privacy protection method of vehicular ad hoc network |
CN103781067A (en) * | 2014-03-03 | 2014-05-07 | 南京理工大学 | Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
-
2017
- 2017-11-30 CN CN201711234735.0A patent/CN107947942B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338444A (en) * | 2013-05-15 | 2013-10-02 | 浙江工商大学 | Vehicle position privacy protection method of vehicular ad hoc network |
CN103781067A (en) * | 2014-03-03 | 2014-05-07 | 南京理工大学 | Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
Non-Patent Citations (1)
Title |
---|
AMOEBA:Robust Location Privacy Scheme for VANET;Krishna Sampigethaya 等;《EEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》;20071031;第25卷(第8期);第1569,1584段 * |
Also Published As
Publication number | Publication date |
---|---|
CN107947942A (en) | 2018-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107947942B (en) | Vehicle position privacy protection method based on group ranking and prestige | |
Wang et al. | Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions | |
Alnasser et al. | Cyber security challenges and solutions for V2X communications: A survey | |
Sharma et al. | A survey on internet of vehicles: Applications, security issues & solutions | |
Boualouache et al. | A survey on pseudonym changing strategies for vehicular ad-hoc networks | |
Papadimitratos et al. | Securing vehicular communications-assumptions, requirements, and principles | |
Artail et al. | A pseudonym management system to achieve anonymity in vehicular ad hoc networks | |
Lu et al. | Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs | |
Boualouache et al. | S2si: A practical pseudonym changing strategy for location privacy in vanets | |
Tripathi et al. | A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS) | |
CN106027233A (en) | Method for designing vehicle network group negotiation communication protocol | |
CN106572088B (en) | A kind of vehicular ad hoc network assumed name transform method based on Virtual User | |
Kumar et al. | An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing | |
Ying et al. | Reputation-based pseudonym change for location privacy in vehicular networks | |
Hu et al. | Vtrust: a robust trust framework for relay selection in hybrid vehicular communications | |
CN110034958B (en) | Vehicle networking pseudonym change incentive algorithm and change method based on SGUM theory | |
Tangade et al. | Trust management scheme in VANET: Neighbour communication based approach | |
CN116321147A (en) | Zero trust-based multi-attribute terminal identity authentication method and system | |
Ghourab et al. | Blockchain-guided dynamic best-relay selection for trustworthy vehicular communication | |
Gazdar et al. | A secure cluster‐based architecture for certificates management in vehicular networks | |
Truong et al. | Trust evaluation for data exchange in vehicular networks | |
Ayed et al. | Blockchain and trust-based clustering scheme for the IoV | |
Zhang et al. | A flickering context-based mix strategy for privacy protection in vanets | |
Hasrouny et al. | Trust model for group leader selection in VANET | |
Raya | Data-centric trust in ephemeral networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |