CN107947942B - Vehicle position privacy protection method based on group ranking and prestige - Google Patents

Vehicle position privacy protection method based on group ranking and prestige Download PDF

Info

Publication number
CN107947942B
CN107947942B CN201711234735.0A CN201711234735A CN107947942B CN 107947942 B CN107947942 B CN 107947942B CN 201711234735 A CN201711234735 A CN 201711234735A CN 107947942 B CN107947942 B CN 107947942B
Authority
CN
China
Prior art keywords
vehicle
group
assumed name
message
leader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711234735.0A
Other languages
Chinese (zh)
Other versions
CN107947942A (en
Inventor
崔杰
陶雪飞
仲红
张静
许艳
石润华
陈志立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201711234735.0A priority Critical patent/CN107947942B/en
Publication of CN107947942A publication Critical patent/CN107947942A/en
Application granted granted Critical
Publication of CN107947942B publication Critical patent/CN107947942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1051Group master selection mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The vehicle position privacy protection method based on group ranking and prestige that the invention discloses a kind of, including the following contents: more vehicle cooperations being encouraged to form the reputation model of group;Assess the privacy model of vehicle location privacy intensity;The formation of group creates a mechanism with dynamic mixing zone domain;Assumed name replaces mechanism.For any vehicle in vehicular ad hoc network network, when its assumed name is when the phase, according to the credit value of itself, actively group is established to control server request, control server is request vehicle allocation group role of leaders, and according to the current location of request vehicle, one Mixed Zone of dynamic formation, other vehicles in Mixed Zone change assumed name to determine whether participating in cooperation according to the credit value of oneself, privacy intensity, assumed name remaining time, and can dynamically adjust the credit value of vehicle.The present invention can encourage more vehicles that group is added, to cooperate to change assumed name, guarantee vehicle location privacy;Meanwhile vehicle does not have to keep silent status in the Mixed Zone of formation, but with group's identity broadcast message, ensure the driving safety of vehicle;Furthermore it is possible to efficiently reduce resource overhead caused by non-essential frequent change assumed name.

Description

Vehicle position privacy protection method based on group ranking and prestige
Technical field
The present invention relates to car networking field of communication security, and in particular to a kind of vehicle location based on group ranking and prestige is hidden Private guard method.
Background technique
In recent years, vehicular ad hoc network has become the promising skill of the efficiency and level of security that improve transportation system Art project and the extensive concern for causing the public.In vehicular ad hoc network, each vehicle is communicated equipped on board unit (OBU) Equipment allows them not only to communicate with one another, i.e., vehicle is communicated with vehicle (V2V), and allow itself and roadside infrastructure into Row communication, i.e., vehicle is communicated with infrastructure (V2I);Meanwhile vehicle is equipped with microprocessor unit, has certain calculating energy Power.Vehicle periodically broadcasts the message to surrounding vehicles, including position, speed, directional information, is perceived with improving vehicle to surrounding vehicles Degree, and the appearance of early warning dangerous situation.It is stolen however, these message can be intercepted easily by attacker, attacker utilizes These message stolen track vehicle, to cause to seriously threaten to vehicle location privacy.
To solve this problem, some scholars propose the scheme for establishing Mixed Zone, carry out location privacy protection, lead to Often, Mixed Zone is to be set to basis with fixed bit, is stopped using specific region as Mixed Zone, such as intersection or large size Parking lot.Vehicle changes assumed name in the area, to prevent attacker from tracking them.However, fixed Mixed Zone is due to its position The limitation set, vehicle must keep silent status in the region, be difficult meet the needs of flexibility.Therefore, dynamic creation is mixed The thought for closing region is suggested, to expedite the emergence of out the assumed name change technique for being dynamically determined mixed zone.Pass through dynamic mixing zone domain side Method, vehicle can change assumed name with dynamic select position.Such as there is scholar to propose the dynamic position privacy mode based on density, appoint K-1 vehicle is must satisfy around meaning vehicle, it is desirable that other vehicles are cooperated to change assumed name together.However, certain selfishnesses The considerations of vehicle is for number one (such as limited assumed name, bandwidth) is reluctant to change assumed name, is difficult to meet k- anonymity Demand causes the probability of the hidden exposure in the position of vehicle to greatly increase.In addition, vehicle is tracked in order to prevent, vehicle is in mixed zone Silent status is generally kept in domain, i.e. vehicle does not broadcast the message externally, does not also receive message, causes very big prestige to traffic safety The side of body.
Summary of the invention
Goal of the invention: it is an object of the invention to solve vehicle position privacy protection method in existing vehicular ad hoc network network to deposit Defect is being obtained, the number of vehicles that such as cooperation changes assumed name is less, leads to location privacy safety reduction;It reduces simultaneously frequent non- Necessary assumed name changes bring resource overhead, and more vehicle cooperations is encouraged to change assumed name, improves the location privacy peace of vehicle Quan Xing;In addition, improving the defect that vehicle keeps silent status in Mixed Zone, vehicle can be broadcast the message with group's identity, be subtracted The hidden danger caused by traffic safety is lacked.
Technical solution: a kind of vehicle position privacy protection method based on group ranking and prestige of the invention, need by The group ranking mechanism more taken turns forms Mixed Zone to change the assumed name of vehicle, comprising the following steps:
(1) it is equipped in vehicular ad hoc network network and measures vehicle i location privacy strength model and credit value model;
Location privacy model are as follows:
Wherein, It is closed in the Mixed Zone that other vehicles are established for kth wheeled vehicle i Make the number of vehicles of change assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle, △ T is assumed name life cycle, △ t is that (△ t is less with respect to the time used in △ T, a settable time range, such as arrives for 1 second for change assumed name remaining time threshold value 30 seconds, can also therefrom appoint and take a value, such as 30 seconds), k is that assumed name changes number,It is vehicle i in the position that kth wheel obtains Set privacy intensity;
Reputation model are as follows:It indicates to obtain by k assumed name change rear vehicle i is accumulative Credit value, wherein NTi zFor vehicle fleet in Mixed Zone,It indicates to take turns the number of vehicles that cooperation changes assumed name, z in z ≤k;
N is equivalent to the effect of subscript value in above-mentioned model, range from 1 toAssuming that vehicle i is mixed in entrance in kth wheel Closing the assumed name used before region is b, is had in the Mixed ZoneA vehicle more renews assumed name, and new assumed name is d, e, f, G, then the new assumed name of vehicle i may be one in this 4 new assumed names, for attacker, successfully by new assumed name d and old vacation Associated probability, that is, the P of name bb→d=1/4.Pb→dIn the different rounds for changing assumed name, numerical value is different, is not one solid Definite value.
(2) when vehicular ad hoc network is added in vehicle for the first time, registered with the true identity of oneself to trust authority TA with obtain it is public/ Private key pair and its corresponding certificate;
(3) assume that the microprocessor of vehicle i calculates the assumed name remaining time of oneself in kth wheelWhenWhen, Vehicle i serves as crowd leader GL to control server CS request;
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic;
(5) Mixed Zone is constructed in the region that vehicle i forms group, group members broadcast of the GL into Mixed Zone changes assumed name Message, vehicle in Mixed Zone can be determined according to oneself assumed name remaining time, the credit value and location privacy intensity of itself Whether participation cooperation changes assumed name.
Further, in the step (1), control server CS is that any vehicle in vehicular ad hoc network network is arranged one Prestige threshold xi and location privacy intensity thresholdThe two threshold values think that privacy class to be achieved is set according to user oneself Fixed, as user is to the difference of the setting of the two threshold values, the location privacy of acquisition can change therewith.
Further, when vehicular ad hoc network network is added in any vehicle of the step (2) for the first time, trust authority TA is the vehicle Distribute a certain number of assumed names, each assumed name had accordingly using the time, so as to vehicle during traveling with pseudonym identity It is sent out message, all message are intended to be encrypted or signed before transmitting.
Further, the detailed process of the step (3) are as follows:
(3.1) whenWhen, vehicle i sends message request to control server CS through roadside unit R SU and serves as group's neck The person of leading GL includes vehicle i currently used assumed name, position, average speed and assumed name remaining time information in the message of transmission;
(3.2) control server CS receives the message of vehicle i, verifyingIt is whether true, in the side of trust authority TA It helps down, sends response message to vehicle i using roadside unit RSU, which includes distributing to group's identity of vehicle i GID, symmetric key kGAnd certificate, control server CS saved in local list simultaneously the assumed name of vehicle i, group's identity GID and Certificate information;
(3.3) after vehicle i receives the response message of control server CS, asking from other vehicles is monitored with group's identity Seek addition message.
Further, the detailed process of the step (4) are as follows:
(4.1) group leader GL periodically broadcasts group with group's identity GID and establishes message, and any vehicle j receives group's foundation Message, judges whether oneself has been crowd leader, if it is, vehicle j, which abandons group, establishes message, otherwise, vehicle j continues to sentence It is disconnected whether to receive the group from other crowd of leader GL and establish message, if it is, vehicle j equally abandons message, otherwise, vehicle Credit value R of the j further according to group leader GLGL, itself assumed name remaining timeThe credit value R of itselfjWith location privacy intensity BjTo determine whether the group that vehicle i is formed is added, become group members;This mode can effectively avoid one of group leader The problem of being the member of another group, while the problem of avoid a vehicle while being added multiple groups.
(4.2) work as RGLWhen >=ξ, vehicle j sends the request that group is added to group leader GL;Work as RGL< ξ andWhen, Vehicle j sends the request that group is added to group leader GL;Work as RGLWhen < ξ, if Rj< ξ andThen vehicle j is to group leader GL sends the request that group is added;Otherwise, until vehicle j assumed name is when the phase, group's neck is served as to control server CS activly request The person of leading;
Wherein, be added in the request message of group include current vehicle use assumed name, certificate,RjAnd Bj, group leader After GL receives the request message of addition group, the identity information of vehicle j is saved, and send response message, the response message to vehicle j Including GID, kGAnd certificate;After vehicle j receives response message, verifies group's identity and save kG;The vehicle in group will pass through k laterG Coded communication, the vehicle in group are given out information to outside group with GID;It is the timeliness for guaranteeing message, every message in the above process In include timestamp information.
Further, the detailed process of the step (5) are as follows:
(5.1) after group establishes, member at least NT in group is selectedi kThe critical zone of a vehicle size is as mixed zone Domain, all vehicles in this region complete assumed name replacement as needed later, whereink△T-△t≤t<k△ T, PchpThe probability for changing assumed name for vehicle in Mixed Zone (such as may be set to 0.5, indicate any vehicle in other vehicles There is 50% probability to change assumed name in Mixed Zone);It is that control server CS sets for any vehicle in vehicular ad hoc network network The location privacy intensity threshold set;
(5.2) group leader GL sends message to control server CS by roadside unit RSU, which includes group's identity GID and certificate, control server CS receive message and are verified, the group's identity that will be saved in group's identity GID and local list GID is compared, and if it exists, proves that group leader GL is effectively, to reply response message to group leader GL, group is allowed to lead Person GL and group members change assumed name as needed;
(5.3) group leader GL kGEncryption changes the message of assumed name and broadcast, and the group members decryption in Mixed Zone disappears Breath, changes assumed name as needed;IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, vehicle The R of jj< ξ andThen vehicle j equally calculates the credit value R of oneselfjWith location privacy intensity Bj, participate in cooperation and change Assumed name;Otherwise, vehicle j keeps assumed name constant, until assumed name is near the phase, actively serves as to the request of CS control server in next round Group leader;
(5.4) primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the mistake of next round Journey.
The utility model has the advantages that compared with prior art, the invention has the following advantages that
(1) invention introduces group ranking mechanism, vehicle is broadcast the message in the process of moving with pseudonym identity, when vehicle from Oneself forms group or when as the other crowd of member, assumed name can be replaced to broadcast the message with group's identity, it is quiet that vehicle does not have to holding Silent state, reduction are threatened caused by traffic safety, and the vehicle in additional mixing region with group's identity broadcast message, enhances The confusion of vehicle, to effectively resist the probability that attacker successfully tracks.
(2) invention introduces the incentive mechanisms of credit value, and prestige initial value is set when vehicular ad hoc network network has just been added in vehicle It is 0, vehicle location personal secrets are relatively low at this time, and vehicle is to improve credit value, will play an active part in cooperation and change assumed name.? During constantly participating in other vehicle cooperations change assumed name, credit value can constantly add up, when credit value reaches specified threshold Value illustrates that it is already engaged in and assumed name is varied multiple times, personal secrets are ensured, may not necessarily participate in assumed name replacement later.
(3) present invention due to each car storage assumed name limitation, if frequently changing assumed name, quickly assumed name will by with It is complete.Therefore, the vehicle in the present invention in Mixed Zone need not all change assumed name, when only meeting the condition specified in scheme Just change assumed name, effectively reduces change assumed name bring resource overhead.
Detailed description of the invention
Fig. 1 is system model structure chart of the invention;
Fig. 2 is overall flow figure of the invention;
Fig. 3 is group's establishment process flow chart in the present invention;
Fig. 4 is that assumed name changes process flow diagram flow chart in the present invention.
Specific embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to the implementation Example.
Embodiment 1:
As shown in Fig. 2, a kind of vehicle position privacy protection method based on group ranking and prestige of the invention, successively includes Following steps:
(1) model for measuring vehicle i location privacy intensity is equipped in vehicular ad hoc network network are as follows:
Wherein, It is closed in the Mixed Zone that other vehicles are established for kth wheeled vehicle i Make the number of vehicles of change assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle.
For example, the assumed name that vehicle uses before entering Mixed Zone is b, cooperation changes the vehicle of assumed name in Mixed Zone Number is 6, and vehicle all continues to travel after leaving Mixed Zone with new assumed name, and the new assumed name of vehicle i may be new false for 6 One in name, i.e.,△ T is assumed name life cycle, is set as 25 minutes, and △ t is change assumed name remaining time threshold Value, is set as 0.5 minute, and k is that assumed name changes number, is set as 30,It is strong for the location privacy that is obtained in kth wheeled vehicle i Degree, value and t, k andIt is related.
It is equipped with the model for measuring vehicle credit value at the same time are as follows:It indicates passing through k Secondary assumed name change rear vehicle i adds up the credit value obtained, wherein NTi zFor vehicle fleet in Mixed Zone.
(2) when vehicular ad hoc network is added in vehicle for the first time, with the true identity of oneself to TA register with obtain public private key-pair and Its corresponding certificate, the initial position privacy intensity of setting vehicle i are 2, and initial credit value is 0.
(3) assume that the microprocessor of vehicle i calculates the assumed name remaining time of oneself in kth wheelWhenWhen, Vehicle i is served as crowd leader (GL) to control server (CS) request, and CS is that the prestige threshold xi of each vehicle setting is 2.0, position Set privacy threshold valueIt is 2.5.
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic.
(5) Mixed Zone is formed in group, group members broadcast of the GL into Mixed Zone changes assumed name message, Mixed Zone Interior vehicle can decide whether that participating in cooperation changes according to oneself assumed name remaining time, the credit value and location privacy intensity of itself Become assumed name.
Wherein assumed name life cycle, assumed name remaining time threshold value, location privacy intensity threshold can be with appropriate adjustment, mixed zones Number of vehicles in domain can meet the eye on every side the requirement of privacy confusion by adjusting Mixed Zone size.
The specific implementation process of step (3) is as follows:
1. working as Ti leftWhen≤△ t, vehicle i sends message request to CS through roadside unit (RSU) and serves as GL, includes in message Vehicle i currently used assumed name, position, average speed and assumed name remaining time information.
2.CS receives message, checks Ti leftWhether≤△ t is true, after being verified, with the help of TA, using RSU Response message is sent to vehicle i, including group's identity (GID), the symmetric key (k for distributing to vehicle iG) and certificate, CS it is same When locally save vehicle i assumed name, GID and certificate.
3. vehicle i is received and can be monitored the request addition from other vehicles with group's identity after the response message of CS and disappear Breath.
As shown in figure 3, the specific implementation process of step (4) is as follows:
1.GL is periodically broadcasted group with GID and establishes message, and any vehicle j receives message, judge oneself whether be Group leader;If it is vehicle j abandons message, and otherwise, vehicle j judges whether that receiving the group from other GL establishes message; If it is vehicle j equally abandons message, otherwise, credit value (R of the vehicle j further according to group leaderGL), itself assumed name residue when BetweenCredit value (the R of itselfj) and location privacy intensity (Bj) to determine whether the group that vehicle i is formed is added, become group Member.
2. working as RGLWhen >=ξ, otherwise vehicle j works as R to the request that GL sends addition groupGLWhen < ξ, ifVehicle j Otherwise the request for sending addition group to GL works as RGLWhen < ξ, if Rj< ξ andVehicle j sends to GL and asking for group is added It asks, otherwise, until vehicle j assumed name is when the phase, serves as crowd leader to CS activly request.
Wherein be added group message in include current vehicle use assumed name, certificate,RjAnd Bj, GL, which is received, is added group Message, save vehicle j identity information, and to vehicle j send response message include GID, kG, certificate.Vehicle j receives response After message, verifies group's identity and save kG.The vehicle in group can pass through k laterGCoded communication, the vehicle in group is to outside group It is given out information with GID.It all include timestamp information in every message in addition, the timeliness in order to guarantee message.
As shown in figure 4, the specific implementation process of step (5) is as follows:
1. selecting member at least NT in group after group foundationi kThe critical zone of a vehicle is as Mixed Zone, Zhi Hou All vehicles in the region complete assumed name replacement as needed, whereinK △ T- △ t≤t < k △ T, PchpFor Vehicle changes the probability of assumed name in Mixed Zone, and P is arrangedchp=0.5.
2.GL sends message to CS by RSU, including GID, certificate, CS receive message and be verified, by GID and local The GID saved in list is compared, and if it exists, proves that GL is effectively, to reply response message to GL, allow GL and group members Change assumed name as needed.
3.GL kGEncryption changes the message of assumed name and broadcast, and the group members in Mixed Zone decrypt message, as needed Change assumed name.IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, the R of vehicle jj< ξ andThen vehicle j equally calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, vehicle j keeps assumed name constant, directly To assumed name near the phase, crowd leader actively is served as to CS request in next round.
4. primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the process of next round.
It can be seen from above-described embodiment that the present invention uses credit mechanism, more vehicle cooperations is encouraged to change assumed name, The confusion for considerably increasing vehicle, has been effectively ensured the location privacy of vehicle, while it is false to reduce non-essential forcibly changing The wasting of resources caused by name.In addition, the present invention, according to vehicle space distribution characteristics, vehicle forms mixed zone in a manner of group ranking Domain, vehicle replaces assumed name to send message in group with group's identity, can effectively reduce the probability that vehicle is tracked, and maintains higher Privacy performance.Vehicle need not keep silent status in group simultaneously, can effectively ensure that the safety of vehicle in the process of moving.

Claims (3)

1. a kind of vehicle position privacy protection method based on group ranking and prestige, it is characterised in that: the following steps are included:
(1) it is equipped in vehicular ad hoc network network and measures vehicle i location privacy strength model and credit value model;
Location privacy model are as follows:
Wherein, Cooperate to change in the Mixed Zone that other vehicles are established for kth wheeled vehicle i Become the number of vehicles of assumed name, Pb→dThe probability of new assumed name d is changed to from old assumed name b for vehicle, and△ T is assumed name Life cycle, △ t are change assumed name remaining time threshold value, and k is that assumed name changes number,It is obtained for vehicle i in kth wheel Location privacy intensity;
Reputation model are as follows:It indicates by the k accumulative acquisition of assumed name change rear vehicle i Credit value, wherein NTi zFor vehicle fleet in Mixed Zone;It indicates to take turns the number of vehicles that cooperation changes assumed name, z≤k in z;
(2) it when vehicular ad hoc network is added in vehicle for the first time, is registered with the true identity of oneself to trust authority TA to obtain public/private key pair Pair and its corresponding certificate;
(3) assume in kth wheel, the microprocessor of vehicle i calculates respectively oneself assumed name remaining time Ti left, work as Ti left≤△t When, vehicle i serves as crowd leader GL to control server CS request;
(3.1) work as Ti leftWhen≤△ t, vehicle i sends message request to control server CS through roadside unit R SU and serves as group leader Person GL includes vehicle i currently used assumed name, position, average speed and assumed name remaining time information in the message of transmission;
(3.2) control server CS receives the message of vehicle i, verifies Ti leftWhether≤△ t is true, in the help of trust authority TA Under, using roadside unit RSU to vehicle i send response message, the response message include distribute to group's identity GID of vehicle i, Symmetric key kGAnd certificate, control server CS save assumed name, group's identity GID and the certificate of vehicle i in local list simultaneously Information;
(3.3) after vehicle i receives the response message of control server CS, the request from other vehicles is monitored with group's identity and is added Enter message;
(4) according to the foundation of group rule, vehicle i establishes group with itself for group leader's dynamic;
(4.1) group leader GL periodically broadcasts group with group's identity GID and establishes message, and any vehicle j receives group and establishes message, Judge whether oneself has been crowd leader, if it is, vehicle j, which abandons group, establishes message, otherwise, vehicle j, which continues judgement, is No to receive the group from other crowd of leader GL and establish message, if it is, vehicle j equally abandons message, otherwise, vehicle j is again According to the credit value R of group leader GLGL, itself assumed name remaining timeThe credit value R of itselfjWith location privacy intensity BjCome Judge whether that the group that vehicle i is formed is added, becomes group members;
(4.2) work as RGLWhen >=ξ, vehicle j sends the request that group is added to group leader GL;Work as RGL< ξ andWhen, vehicle j The request that group is added is sent to group leader GL;Work as RGLWhen < ξ, if Rj< ξ andThen vehicle j is sent to group leader GL The request of group is added;Otherwise, until vehicle j assumed name is when the phase, crowd leader, ξ are served as to control server CS activly request For prestige threshold value,For location privacy intensity threshold;
Wherein, be added in the request message of group include current vehicle use assumed name, certificate,RjAnd Bj, group leader GL receipts To after being added the request message of group, the identity information of vehicle j is saved, and send response message to vehicle j, which includes GID、kGAnd certificate;After vehicle j receives response message, verifies group's identity and save kG;The vehicle in group will pass through k laterGEncryption It communicates, the vehicle in group is given out information to outside group with GID;
(5) Mixed Zone is constructed in the region that vehicle i forms group, group members broadcast of the GL into Mixed Zone changes assumed name and disappears Breath, vehicle in Mixed Zone can be according to oneself assumed name remaining time, credit value and location privacy the intensity judgement of itself No participation cooperation changes assumed name;
(5.1) after group establishes, member at least NT in group is selectedi kThe critical zone of a vehicle size as Mixed Zone, it All vehicles in this region complete assumed name replacement as needed afterwards, whereinK △ T- △ t≤t < k △ T, Pchp Change the probability of assumed name for vehicle in Mixed Zone;It is that control server CS is arranged for any vehicle in vehicular ad hoc network network Location privacy intensity threshold;
(5.2) group leader GL sends message to control server CS by roadside unit RSU, which includes group's identity GID And certificate, control server CS receive message and are verified, the group's identity GID that will be saved in group's identity GID and local list It is compared, and if it exists, prove that group leader GL is effectively, to reply response message to group leader GL, allow group leader GL and group members change assumed name as needed;
(5.3) group leader GL kGEncryption changes the message of assumed name and broadcast, and the group members in Mixed Zone decrypt message, root According to needing to change assumed name;IfVehicle j calculates the R of oneselfjAnd Bj, participate in cooperation and change assumed name;Otherwise, the R of vehicle jj < ξ andThen vehicle j equally calculates the credit value R of oneselfjWith location privacy intensity Bj, participate in cooperation and change assumed name;It is no Then, vehicle j keeps assumed name constant, until assumed name is near the phase, actively serves as group leader to the request of CS control server in next round Person;
(5.4) primary group establish and its Mixed Zone in assumed name change procedure terminate, rear vehicle enter the process of next round.
2. the vehicle position privacy protection method according to claim 1 based on group ranking and prestige, it is characterised in that: institute It states in step (1), control server CS is that prestige threshold xi and location privacy intensity is arranged in any vehicle in vehicular ad hoc network network Threshold value
3. the vehicle position privacy protection method according to claim 1 based on group ranking and prestige, it is characterised in that: institute When stating any vehicle of step (2) vehicular ad hoc network network being added for the first time, trust authority TA is a certain number of assumed names of the vehicle allocation, Each assumed name has accordingly using time △ T, so that vehicle is sent out message during traveling with pseudonym identity, owns Message is intended to be encrypted or signed before transmitting.
CN201711234735.0A 2017-11-30 2017-11-30 Vehicle position privacy protection method based on group ranking and prestige Active CN107947942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711234735.0A CN107947942B (en) 2017-11-30 2017-11-30 Vehicle position privacy protection method based on group ranking and prestige

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711234735.0A CN107947942B (en) 2017-11-30 2017-11-30 Vehicle position privacy protection method based on group ranking and prestige

Publications (2)

Publication Number Publication Date
CN107947942A CN107947942A (en) 2018-04-20
CN107947942B true CN107947942B (en) 2019-08-27

Family

ID=61947917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711234735.0A Active CN107947942B (en) 2017-11-30 2017-11-30 Vehicle position privacy protection method based on group ranking and prestige

Country Status (1)

Country Link
CN (1) CN107947942B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107580048B (en) * 2017-09-04 2020-07-14 东北大学 VANETs position privacy protection system and method based on virtual Mix-zone
CN108769926B (en) * 2018-05-16 2020-10-23 电子科技大学 Group perception layer-based car networking privacy protection method and car networking framework
CN109561383A (en) * 2018-12-17 2019-04-02 昆明理工大学 A kind of location privacy protection method based on dynamic assumed name exchange area
CN110034958B (en) * 2019-04-02 2022-11-11 浙江工商大学 Vehicle networking pseudonym change incentive algorithm and change method based on SGUM theory
CN110430567B (en) * 2019-07-31 2023-03-24 福建师范大学 Internet of vehicles pseudonym replacement method based on game analysis
US11240659B2 (en) * 2019-12-09 2022-02-01 Intel Corporation Privacy protection mechanisms for connected vehicles
CN112351408B (en) * 2021-01-08 2021-04-06 北京电信易通信息技术股份有限公司 Data safety transmission method and system for intelligent network-connected electric vehicle
CN112969173B (en) * 2021-02-01 2022-08-30 河南工学院 Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle
CN114051235B (en) * 2021-08-28 2024-03-29 北京工业大学 Vehicle track privacy protection method in Internet of vehicles scene

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338444A (en) * 2013-05-15 2013-10-02 浙江工商大学 Vehicle position privacy protection method of vehicular ad hoc network
CN103781067A (en) * 2014-03-03 2014-05-07 南京理工大学 Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338444A (en) * 2013-05-15 2013-10-02 浙江工商大学 Vehicle position privacy protection method of vehicular ad hoc network
CN103781067A (en) * 2014-03-03 2014-05-07 南京理工大学 Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AMOEBA:Robust Location Privacy Scheme for VANET;Krishna Sampigethaya 等;《EEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》;20071031;第25卷(第8期);第1569,1584段 *

Also Published As

Publication number Publication date
CN107947942A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
CN107947942B (en) Vehicle position privacy protection method based on group ranking and prestige
Wang et al. Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions
Alnasser et al. Cyber security challenges and solutions for V2X communications: A survey
Sharma et al. A survey on internet of vehicles: Applications, security issues & solutions
Boualouache et al. A survey on pseudonym changing strategies for vehicular ad-hoc networks
Papadimitratos et al. Securing vehicular communications-assumptions, requirements, and principles
Artail et al. A pseudonym management system to achieve anonymity in vehicular ad hoc networks
Lu et al. Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs
Boualouache et al. S2si: A practical pseudonym changing strategy for location privacy in vanets
Tripathi et al. A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)
CN106027233A (en) Method for designing vehicle network group negotiation communication protocol
CN106572088B (en) A kind of vehicular ad hoc network assumed name transform method based on Virtual User
Kumar et al. An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
Ying et al. Reputation-based pseudonym change for location privacy in vehicular networks
Hu et al. Vtrust: a robust trust framework for relay selection in hybrid vehicular communications
CN110034958B (en) Vehicle networking pseudonym change incentive algorithm and change method based on SGUM theory
Tangade et al. Trust management scheme in VANET: Neighbour communication based approach
CN116321147A (en) Zero trust-based multi-attribute terminal identity authentication method and system
Ghourab et al. Blockchain-guided dynamic best-relay selection for trustworthy vehicular communication
Gazdar et al. A secure cluster‐based architecture for certificates management in vehicular networks
Truong et al. Trust evaluation for data exchange in vehicular networks
Ayed et al. Blockchain and trust-based clustering scheme for the IoV
Zhang et al. A flickering context-based mix strategy for privacy protection in vanets
Hasrouny et al. Trust model for group leader selection in VANET
Raya Data-centric trust in ephemeral networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant