CN112969173B - Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle - Google Patents

Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle Download PDF

Info

Publication number
CN112969173B
CN112969173B CN202110133855.1A CN202110133855A CN112969173B CN 112969173 B CN112969173 B CN 112969173B CN 202110133855 A CN202110133855 A CN 202110133855A CN 112969173 B CN112969173 B CN 112969173B
Authority
CN
China
Prior art keywords
vehicle
pseudonym
replacement
sensitive area
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110133855.1A
Other languages
Chinese (zh)
Other versions
CN112969173A (en
Inventor
赵开新
翟海庆
马瑛东
郜广兰
史红玉
马同伟
魏勇
孙冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Renault Technology Development Co ltd
Sichuan Qianyiding Technology Co ltd
Original Assignee
Henan Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Institute of Technology filed Critical Henan Institute of Technology
Priority to CN202110133855.1A priority Critical patent/CN112969173B/en
Publication of CN112969173A publication Critical patent/CN112969173A/en
Application granted granted Critical
Publication of CN112969173B publication Critical patent/CN112969173B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Traffic Control Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a position privacy protection method and a system in a 5G vehicle-mounted network based on virtual vehicles, which comprises a trusted center TA, a 5G base station 5G-BS, a sensitivity management mechanism SAMD and an edge server ES j And the virtual vehicle is used for protecting the position privacy of the vehicle, and in the position privacy sensitive area, the virtual vehicle is added by the system according to the actual position privacy requirement of the vehicle, so that the purpose of confusing the enemy is achieved, and the position privacy protection is realized. In addition, the method measures the position privacy degree of the vehicle in a certain area through the virtual pseudonym entropy.

Description

Location privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle
Technical Field
The invention belongs to the technology of privacy security protection of Internet of vehicles, and particularly relates to a position privacy protection method and system in a 5G vehicle-mounted network based on virtual vehicles.
Background
In recent years, 5G technology has seen a qualitative leap. Due to the improvements of the method in delay, system capacity, spectrum efficiency, communication range and channel reliability, and the characteristic of supporting device-to-device communication, the method brings huge opportunity for the development of the mobile internet industry.
So-called vehicle networks (VANETs) are distributed ad-hoc networks formed by many different types of vehicles communicating with other entities in a wireless network environment by means of their installed on-board units (OBUs). In order to improve the driving experience of the vehicle owner and ensure the safety of the vehicle owner, the vehicle needs to periodically broadcast safety information including information such as position, speed, orientation and acceleration to surrounding vehicles. Although the safety of vehicle driving in the Internet of vehicles is guaranteed to a certain extent, the leakage of safety information can threaten the position privacy of the vehicle owner, and an adversary can obtain the personal privacy of the vehicle owner through the position information of the vehicle, including the home address, the work unit and the like of the vehicle owner, so that great danger can be brought to the vehicle owner. The internet of vehicles must therefore provide a sufficiently powerful location privacy protection mechanism to ensure that the privacy of the vehicle owners can be protected.
The conventional solution considers the method of using pseudonyms to achieve location privacy, i.e., vehicles broadcast security information using pseudonyms to prevent tracking by adversaries. Unfortunately, in these solutions, the number of vehicles is limited to the pseudonymization, and in the case of a small number of vehicles, blindly performing the pseudonymization poses a great security threat, but the privacy of the vehicle location is still compromised by using the same pseudonymization for a long time. Meanwhile, the vehicle pseudonym replacement areas considered by the schemes do not include areas with high position privacy requirements, such as government offices, hospitals and the like, and the position privacy of the vehicle in the areas needs to be protected urgently.
The 5G technology has the characteristics of high reliability, low time delay and the like, connection can be established between vehicles more quickly, efficient communication cooperation is realized, and therefore the position privacy of the vehicles is protected. However, no technology currently considers location privacy protection in the case where there are a small number of vehicles in a location privacy sensitive area and a pseudonymous change area in a 5G internet of vehicles.
Disclosure of Invention
The invention aims to: the invention aims to solve the defects in the prior art and provides a method and a system for protecting the position privacy in a 5G vehicle-mounted network based on a virtual vehicle.
The technical scheme is as follows: the invention discloses a position privacy protection method in a 5G vehicle-mounted network based on virtual vehicles, which comprises the following steps:
step S1, system initialization
All vehicles are registered in a trusted center TA, and information to be used in the journey, including a public key for communication, is obtained
Figure BDA0002926364670000021
Private key
Figure BDA0002926364670000022
And certificate Cert i And pseudonym public key for transmitting security information
Figure BDA0002926364670000023
Private key
Figure BDA0002926364670000024
And certificate
Figure BDA0002926364670000025
Meanwhile, the vehicle initializes a pseudonymous policy management module PAMM;
step S2, sensitive area adding
The vehicle can monitor the position of the vehicle in real time in the driving process, and if the vehicle reaches a sensitive area SA j Then, it will contact the edge server ES j Negotiating session keys if the vehicle does not reach the sensitive area SA j If so, no response is made;
step S3, pseudonym exchange
When the vehicle is in the sensitive area SA j If so, using the pseudonymous name to broadcast the safety information, and entering a pseudonymous name replacement preparation stage, namely determining whether to participate in the pseudonymous name replacement according to the information interaction with the edge server by the vehicle, and performing a formal pseudonymous name replacement process after determining to perform the pseudonymous name replacement, wherein a pseudonymous name replacement strategy of the vehicle in a sensitive area is calculated by a pseudonymous name strategy management module PAMM;
step S4, leaving sensitive area
When the vehicle judges that the position of the vehicle does not belong to the sensitive area SA j When it is time, delete with edge server ES j Session information of (2); if edge server ES j And deleting the conversation message with the corresponding vehicle if the message sent by the vehicle is not received in the corresponding time period.
Further, the detailed process of step S1 is as follows:
s1.1, the vehicle stores the information sent by the credible center TA in an on-board unit OBU, and stores a pseudonym set in a pseudonym pool in the vehicle;
step S1.2, the vehicle updates pseudonym table according to the update table in the pseudonym policy management module PAMM, the sensitive area management mechanism SAMD sends part of sensitive area coordinates and corresponding information to the vehicle, and the vehicle updates the update table in the pseudonym policy management module PAMM according to the information after receiving the information to prepare for subsequent pseudonym replacement.
Further, the detailed process of step S1.2 is:
each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, wherein the pseudonymous name strategy management module PAMM comprises a pseudonym table and an update table; initializing a pseudonymous name policy management module (PAMM) before a vehicle runs:
firstly, updating a pseudonym table according to an update table in a pseudonym policy management module (PAMM), wherein the pseudonym table is used for selecting pseudonym policies in the current journey, and the table content of the pseudonym is unchanged in the driving process of a vehicle; secondly, the pseudonym policy management module PAMM preloads the table entries of the update table according to the coordinate information of the sensitive area sent by the sensitive area management mechanism SAMD, the update table is dynamic in the driving process, and when the vehicle passes through the sensitive area, the pseudonym policy management module PAMM updates the table through a corresponding algorithm, thereby obtaining a table quantifying the position privacy requirement.
Further, the detailed process of step S2 is as follows:
s2.1, the vehicle obtains the position of the vehicle through a Global Positioning System (GPS) in the running process and converts the position into the coordinate system coordinate { x ] of the affiliated area i ,y i ,z i };
Step S2.2, edge server ES j Periodically broadcasting the information of the sensitive area managed by the vehicle, and when the vehicle receives the information, the vehicle coordinates x according to the coordinate system i ,y i ,z i Checking if it is in the sensitive area SA j
If the vehicle is located in the sensitive area SA j The vehicle will execute the update table update algorithm while the vehicle and edge server ES are running j Negotiating and calculating a session key sk for subsequent communication; if the vehicle is not in the sensitive area SA j No response is made.
Further, the details of the pseudonym replacement preparation stage in step S3 are as follows:
s3.1.1, edge server ES j Sending a pseudonym exchange preparation message E to the vehicle having negotiated the session key sk (SA j ||content||Ready||Cert ESj Ts); content denotes the message content, Ts is the time stamp, Cert ESj Refers to the certificate of the edge server, and Ready refers to the message type for preparing the message for replacement;
s3.1.2, after the vehicle receives the message, it verifies whether the message is legal, if so, it sends the value in the update table to the edge server ES j If not, rejecting the message;
s3.1.3, edge server ES j After receiving the value message, determining the number of false vehicles which need to be increased finally according to the value values sent by all vehicles, and sending replacement initial information to the corresponding vehicles
Figure BDA0002926364670000031
N v The number of vehicles for changing the pseudonyms is represented, and totalnumber refers to the number of real vehicles participating in the pseudonym change in the local area;
s3.1.4, when the vehicle receives the replacement initial information, it decides whether to participate in the pseudonym replacement, and sends the pseudonym replacement policy to the edge server ES j
S3.1.5, edge server ES j Statistics of what was sent in step S3.1.4The information is available, and the final number of vehicles participating in the pseudonymization is known.
The specific method of the step S3.1.4 is as follows:
assuming that the utility function of vehicle pseudonym replacement is U (C), continuously maintaining the utility function of the current pseudonym as U (M), firstly, the vehicle calculates the values of U (C) and U (M), and when U (C) is more than or equal to U (M), the vehicle will perform pseudonym replacement; otherwise, when U (C)<U (M), the vehicle will choose to keep the original pseudonym PID i,k
Further, the details of formally performing the pseudonymous name replacement in step S3 are as follows:
s3.2.1, edge server ES j Sending a specific change message to all vehicles participating in the pseudonym change
Figure BDA0002926364670000041
S3.2.2, after the vehicle receives the replacement message, it first verifies if the message is legal, if yes, the pseudonym identity is replaced at time
Figure BDA0002926364670000042
If the message is rejected without rules, the original pseudonym PID is continuously used i,k Broadcasting a security message;
wherein,
Figure BDA0002926364670000043
in turn a vehicle V i The public key, the private key and the certificate of the kth pseudonym.
The invention also discloses a system for realizing the position privacy protection method in the virtual vehicle-based 5G vehicle-mounted network, which comprises the following entities: trusted center TA, 5G-base station 5G-BS, sensitivity management organization SAMD, edge server ES j And a vehicle; each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, the vehicle is communicated with other entities through a wireless communication module in OBU equipment, the global positioning system GPS acquires the real-time position of the vehicle, the pseudonymous name pool is used for storing pseudonymous names, and the pseudonymous name strategy management module PAMM calculates a pseudonymous name replacement strategy of the vehicle;and the pseudonym policy management module PAMM includes a pseudonym table including a Number, a Coordinate, a Value, and a Flag, and an update table including a Number, a Coordinate, an Arrival, and a Flag.
Has the advantages that: compared with the prior art, the invention has the following advantages and disadvantages:
(1) the invention provides a virtual vehicle-based location privacy protection method suitable for a 5G vehicle networking, which solves the problem that the traditional pseudonym replacement is limited by the number of vehicles and provides more comprehensive location privacy protection;
(2) the invention expands the pseudonymous name replacing area from social hotspot spots area to sensitive area, uses some places needing high-level position privacy protection, such as government organs, hospitals and the like, as the place for pseudonymous name replacement, and quantifies the position privacy requirement of the vehicle by using the visit times of the vehicle, thereby realizing a more practical privacy protection scheme;
(3) the invention designs a pseudonym replacement game, pseudonym replacement can be carried out only by vehicles meeting conditions, pseudonym replacement strategies of different vehicles can be different, personalized position privacy is realized, and meanwhile, the invention also provides a new position privacy measurement standard.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic diagram of an embodiment of the present invention;
FIG. 3 is a pseudonym table in a vehicle according to an embodiment of the present invention;
FIG. 4 is an update table in a vehicle according to an embodiment of the present invention;
FIG. 5 is a diagram of pseudonym entropy obtained by different solutions in the examples;
FIG. 6 is a schematic diagram of a vehicle replacement utility function U (C) in an embodiment;
fig. 7 is a diagram of the vehicle maintenance utility function u (m) in the embodiment.
Detailed Description
The technical solution of the present invention is described in detail below, but the scope of the present invention is not limited to the embodiments.
As shown in fig. 1 and fig. 2, the system for implementing the location privacy protection method in the virtual vehicle-based 5G vehicular network of the present embodiment includes the following entities: trusted center TA, 5G-base station 5G-BS, sensitivity management organization SAMD, edge server ES j And each vehicle.
Each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous pool and a pseudonymous strategy management module PAMM; the system comprises a Global Positioning System (GPS) and a pseudonym pool, wherein the wireless communication module in the OBU equipment is used for communicating with other entities, the GPS is used for acquiring the real-time position of a vehicle, and the pseudonym pool is used for storing pseudonyms; the pseudonym policy management module PAMM is used to calculate a pseudonym replacement policy for the vehicle.
The pseudonym policy management module includes a pseudonym table and an update table, as shown in fig. 3 and 4, the pseudonym table includes entries such as a Number, a Coordinate, a Value, a Flag, and the like, and the update table includes entries such as a Number, a Coordinate, an Arrival, a Value, a Flag, and the like.
The method for protecting the position privacy in the virtual vehicle-based 5G Internet of vehicles comprises the following steps:
(1) initialization:
(1.1) the trusted center TA generates system corresponding parameters, preloads the system parameters to the OBU of the vehicle through a safe communication channel, and simultaneously sends identity information required to be used in the driving process to the vehicle
Figure BDA0002926364670000061
And pseudonym information
Figure BDA0002926364670000062
(1.2) the vehicle updates pseudonym table according to the update table in the pseudonym policy management module PAMM, meanwhile, the sensitive area management mechanism SAMD sends part of sensitive area coordinates and corresponding information to the vehicle, and after the vehicle receives the message, the vehicle updates the update table in the pseudonym policy management module PAMM according to the message, so as to prepare for subsequent pseudonym replacement, and the specific implementation is as follows:
(1.2.1) updating pseudonym table with the contents of update table for vehicle;
(1.2.2) sensitive area management agency SAMD sends coordinates (x) of the sensitive area to the vehicle i ,y i ,z i ) Wherein i is more than or equal to 1 and less than or equal to N; the vehicle updates the coordinate items in the update table according to the received information.
(2) Adding a sensitive area:
(2.1) in the running process of the vehicle, the position coordinates of the vehicle can be obtained in real time through a Global Positioning System (GPS), and the position coordinates are converted into the coordinates { x) of the coordinate system of the region to which the vehicle belongs i ,y i ,z i };
(2.2) edge Server ES j Periodically broadcasts the sensitive area information managed by the vehicle, and when receiving the information, the vehicle checks whether the vehicle is located in the sensitive area SA j And performing the following operations:
(2.2.1) dynamically updating the update table by using the algorithm 1;
Figure BDA0002926364670000063
Figure BDA0002926364670000071
(2.2.2) if the vehicle is located in the area SA j Vehicle and edge server ES j The negotiation calculates a session key sk for subsequent communication.
(3) Kana change
The vehicle is positioned in the sensitive area, the kana broadcasting safety information is used, at the moment, the vehicle needs to decide whether to participate in the kana replacement according to the context information, and a formal kana replacement process is carried out after the kana replacement is decided; the specific process is as follows:
(3.1) pseudonym exchange preparation process:
(3.1.1) edge Server ES j To the car that has negotiated the conversation cipher keyVehicle transmitting pseudonym exchange preparation message E sk (SA j ||content||Ready||Cert ESj ||Ts);
(3.1.2) after the vehicle receives the message, the value in the update table is sent to the edge server ES j
(3.1.3) edge Server ES j After receiving the message, determining the number of vehicles D equal to value required by the pseudonym replacement according to the value values sent by all vehicles MAX K and sending replacement initial information to the vehicle
Figure BDA0002926364670000072
(3.1.4) when the vehicle receives the initial information of the replacement, the vehicle decides whether to participate in the pseudonym replacement or not and sends the pseudonym replacement strategy to the edge server ES j
The vehicle determines whether to participate in the kana replacement through the kana replacement game, and the vehicle makes a decision according to the current kana age and the context information. Assuming that the utility function of vehicle pseudonym replacement is U (C), continuously maintaining the utility function of the current pseudonym as U (M), firstly, the vehicle calculates the values of U (C) and U (M), and when U (C) is more than or equal to U (M), the vehicle will perform pseudonym replacement; otherwise, when u (c) < u (m), the vehicle will choose to keep the original pseudonym, which is implemented as follows:
in this embodiment, the pseudonymous entropy of the vehicle in a certain region is E ═ log 2 n, assuming the sensitive area is SA j The vehicles in the region are collected as V ═ V 1 ,v 2 ,……,v n The corresponding pseudonym policy set is S ═ S 1 ,S 2 ,……,S n The function set of the replacement utility of the vehicle is U (C) ═ U (C) 1 ,U(C) 2 ,……,U(C) n Maintain the utility function set of the pseudonym replacement as U (M) ═ U (M) 1 ,U(M) 2 ,……,U(M) n V for any vehicle i The replacement utility function can be expressed as
Figure BDA0002926364670000081
c is the cost of pseudonymization; the maintenance utility function can be expressed as U i (M)=w(Z-△t)+(1-w)log 2 n is the same as the formula (I). When N is more than or equal to N v Time, vehicle calculation
Figure BDA0002926364670000082
When n is a value of<N v When the vehicle will calculate
Figure BDA0002926364670000083
Value of (D), if U i >0, vehicle setting strategy S i 1, indicates that a pseudonym change is to be made, whereas S is reversed i 0 indicates that no pseudonym replacement is performed.
(3.1.5) edge Server ES j All information is counted, and the final number of vehicles participating in the pseudonymization is obtained.
And (3.2) pseudonym replacement implementation process:
(3.2.1) edge Server ES j Sending a specific change message to all vehicles participating in the pseudonym change
Figure BDA0002926364670000084
time represents the time of the pseudonym change of the current round;
(3.2.2) after the vehicle receives the message, firstly, verifying whether the message is legal or not, and if so, replacing the pseudonym identity with the pseudonym identity at the time
Figure BDA0002926364670000085
Otherwise, the message is rejected and the original pseudonym PID is continuously used i,k A security message is broadcast.
(4) Sensitive area departure
When the vehicle judges that the position of the vehicle does not belong to the sensitive area SA j When it is time, the ES with the edge server will be deleted j Session information of (2); if edge server ES j If the message sent by the vehicle is not received within a period of time, the conversation message with the corresponding vehicle is deleted.
In order to show that the present invention can comprehensively implement location privacy protection, the embodiment uses a virtual pseudonym entropy as a location privacy measurement standard:
Figure BDA0002926364670000086
wherein
Figure BDA0002926364670000087
The probability of possible tracking is shown and compared with another internet of vehicles location privacy protection scheme MARP.
For convenience, this implementation defines some of the symbols as follows:
Figure BDA0002926364670000091
as shown in fig. 5, the magnitude of the entropy of the virtual pseudonyms obtainable with the MARP solution of the present invention and the prior art (the number of vehicles is set between 10 and 100) in the case where the number of vehicles is different. Fig. 6 and 7 show how the replacement utility function u (c) and the maintenance utility function u (m) are influenced by the pseudonym age and the number of vehicles.
In summary, in the invention, the vehicle broadcasts the safety message by the pseudonym, during the driving process, the vehicle firstly obtains the required position privacy protection requirement according to the self moving track to prepare for the next trip, meanwhile, when the vehicle reaches the sensitive area, the pseudonym replacing game is carried out according to the self pseudonym age, the context information and the self position privacy requirement degree, if the vehicle can obtain higher position privacy protection degree by the pseudonym replacing, the vehicle will carry out the pseudonym replacing, otherwise, the vehicle will continue to maintain the original pseudonym.

Claims (5)

1. A location privacy protection method in a 5G vehicle-mounted network based on virtual vehicles is characterized in that: the method comprises the following steps:
step S1, system initialization
All vehicles are registered in the trust center TA, and information to be used in the journey is acquired, including a public key for communication
Figure FDA0003720655580000011
Private key
Figure FDA0003720655580000012
And certificate Cert i And pseudonym public key for transmitting security information
Figure FDA0003720655580000013
Private key
Figure FDA0003720655580000014
And certificate
Figure FDA0003720655580000015
Meanwhile, the vehicle initializes a pseudonymous policy management module PAMM;
step S2, sensitive area adding
The vehicle can monitor the position of the vehicle in real time in the driving process, and if the vehicle reaches a sensitive area SA j Then, it will contact the edge server ES j Negotiating a session key, if the vehicle does not reach the sensitive area SA j If yes, no response is made;
step S3, pseudonym exchange
When the vehicle is in the sensitive area SA j If so, using the pseudonymous name to broadcast the safety information, and entering a pseudonymous name replacement preparation stage, namely determining whether to participate in the pseudonymous name replacement according to the information interaction with the edge server by the vehicle, and performing a formal pseudonymous name replacement process after determining to perform the pseudonymous name replacement, wherein a pseudonymous name replacement strategy of the vehicle in a sensitive area is calculated by a pseudonymous name strategy management module PAMM;
step S4, leaving sensitive area
When the vehicle judges that the position of the vehicle does not belong to the sensitive area SA j When it is time, delete with edge server ES j The session information of (2); if edge server ES j If the message sent by the vehicle is not received in the corresponding time period, deleting the conversation message with the corresponding vehicle;
details of the pseudonym replacement preparation stage in step S3 are as follows:
s3.1.1, edge server ES j Sending a pseudonym change to a vehicle that has negotiated a session keyPrepare message E sk (SA j ||content||Ready||Cert ESj Ts); content denotes the message content, Ts is the time stamp, Cert ESj Refers to the certificate of the edge server, and Ready refers to the message type for preparing the message for replacement;
s3.1.2, after the vehicle receives the message, it verifies whether the message is legal, if so, it sends the value in the update table to the edge server ES j If not, rejecting the message;
s3.1.3, edge server ES j After receiving the value message, determining the number of false vehicles which need to be increased finally according to the value values sent by all vehicles, and sending replacement initial information to the corresponding vehicles
Figure FDA0003720655580000021
N v The number of vehicles for changing the pseudonyms is shown, and totalnumber refers to the number of real vehicles participating in the pseudonym change in the area;
s3.1.4, when the vehicle receives the replacement initial information, it decides whether to participate in the pseudonym replacement, and sends the pseudonym replacement policy to the edge server ES j (ii) a Assuming that the utility function of vehicle pseudonym replacement is U (C), continuously maintaining the utility function of the current pseudonym as U (M), firstly, the vehicle calculates the values of U (C) and U (M), and when U (C) is more than or equal to U (M), the vehicle will perform pseudonym replacement; otherwise, when U (C) < U (M), the vehicle will choose to keep the original pseudonym PID i,k
S3.1.5, edge server ES j Counting all the information sent in step S3.1.4, and knowing the final number of vehicles participating in pseudonymization;
the details of formally performing the pseudonym replacement in step S3 are:
s3.2.1, edge server ES j Sending a specific change message to all vehicles participating in the pseudonym change
Figure FDA0003720655580000022
S3.2.2, after the vehicle receives the replacement message, it first verifies if the message is legal, if so, it replaces the pseudonym at timeIdentity is
Figure FDA0003720655580000023
If the message is rejected without rules, the original pseudonym PID is continuously used i,k Broadcasting a safety message;
wherein,
Figure FDA0003720655580000024
in turn a vehicle V i The public key, the private key and the certificate of the kth pseudonym.
2. The method of location privacy protection in a virtual vehicle based 5G in-vehicle network as claimed in claim 1, wherein: the detailed process of step S1 is:
s1.1, the vehicle stores the information sent by the credible center TA in an on-board unit OBU, and stores a pseudonym set in a pseudonym pool in the vehicle;
step S1.2, the vehicle updates pseudonym table according to the update table in the pseudonym policy management module PAMM, the sensitive area management mechanism SAMD sends part of sensitive area coordinates and corresponding information to the vehicle, and the vehicle updates the update table in the pseudonym policy management module PAMM according to the information after receiving the information to prepare for subsequent pseudonym replacement.
3. The method of location privacy protection in a virtual vehicle based 5G in-vehicle network as claimed in claim 2, wherein: the detailed process of the step S1.2 is as follows:
each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, wherein the pseudonymous name strategy management module PAMM comprises a pseudonym table and an update table; initializing a pseudonymous name policy management module (PAMM) before a vehicle runs:
firstly, updating a pseudonym table according to an update table in a pseudonym policy management module (PAMM), wherein the pseudonym table is used for selecting pseudonym policies in the current journey, and the table content of the pseudonym is unchanged in the driving process of a vehicle; secondly, the pseudonym policy management module PAMM preloads the table entries of the μ pdate table according to the coordinate information of the sensitive area sent by the sensitive area management mechanism SAMD, the update table is dynamic in the driving process, and when the vehicle passes through the sensitive area, the pseudonym policy management module PAMM updates the table through a corresponding algorithm, thereby obtaining the table quantifying the location privacy requirements.
4. The method for location privacy protection in a virtual vehicle based 5G in-vehicle network according to claim 1, characterized in that: the detailed process of step S2 is:
s2.1, acquiring the position of the vehicle through a Global Positioning System (GPS) in the running process of the vehicle, and converting the position into the coordinate { x) of the coordinate system of the region to which the vehicle belongs i ,y i ,z i };
Step S2.2, edge server ES j Periodically broadcasting the information of the sensitive area managed by the vehicle, and when the vehicle receives the information, the vehicle coordinates x according to the coordinate system i ,y i ,z i Checking if it is in the sensitive area SA j
If the vehicle is located in the sensitive area SA j The vehicle will execute the update table update algorithm, while the vehicle and edge server ES j Negotiating and calculating a session key sk; if the vehicle is not in the sensitive area SA j No response is made.
5. A system for implementing the location privacy protection method in the virtual vehicle based 5G vehicle network according to any one of claims 1 to 4, characterized in that: the method comprises the following entities: trusted center TA, 5G-base station 5G-BS, sensitive area management organization SAMD and edge server ES j And a vehicle;
each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, the vehicle is communicated with other entities through a wireless communication module in OBU equipment, the global positioning system GPS acquires the real-time position of the vehicle, the pseudonymous name pool is used for storing pseudonymous names, and the pseudonymous name strategy management module PAMM calculates a pseudonymous name replacement strategy of the vehicle;
and the pseudonym policy management module PAMM includes a pseudonym table including a Number, a Coordinate, a Value, and a Flag, and an update table including a Number, a Coordinate, an Arrival, and a Flag.
CN202110133855.1A 2021-02-01 2021-02-01 Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle Active CN112969173B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110133855.1A CN112969173B (en) 2021-02-01 2021-02-01 Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110133855.1A CN112969173B (en) 2021-02-01 2021-02-01 Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle

Publications (2)

Publication Number Publication Date
CN112969173A CN112969173A (en) 2021-06-15
CN112969173B true CN112969173B (en) 2022-08-30

Family

ID=76272228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110133855.1A Active CN112969173B (en) 2021-02-01 2021-02-01 Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle

Country Status (1)

Country Link
CN (1) CN112969173B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396285A (en) * 2017-07-12 2017-11-24 中国科学院深圳先进技术研究院 Vehicle method for secret protection, device, equipment and storage medium
CN107947942A (en) * 2017-11-30 2018-04-20 安徽大学 Vehicle position privacy protection method based on group ranking and prestige
WO2019041896A1 (en) * 2017-09-04 2019-03-07 东北大学 Virtual mix-zone-based vanet position privacy protection system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008154941A1 (en) * 2007-06-20 2008-12-24 Nec Deutschland Gmbh Method for preserving the privacy of nodes in a network
KR101894666B1 (en) * 2017-05-11 2018-09-04 한양대학교 에리카산학협력단 Method for updating location of vehicle to preserve location privacy of connected vehicles and system therefor
CN110099367A (en) * 2019-04-26 2019-08-06 河南工学院 Car networking secure data sharing method based on edge calculations
CN111556437B (en) * 2020-05-12 2021-11-16 重庆邮电大学 Personalized position privacy protection method based on differential privacy

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396285A (en) * 2017-07-12 2017-11-24 中国科学院深圳先进技术研究院 Vehicle method for secret protection, device, equipment and storage medium
WO2019041896A1 (en) * 2017-09-04 2019-03-07 东北大学 Virtual mix-zone-based vanet position privacy protection system and method
CN107947942A (en) * 2017-11-30 2018-04-20 安徽大学 Vehicle position privacy protection method based on group ranking and prestige

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
车联网中假名变更策略研究综述;江荣旺;《物联网技术》;20201020;全文 *

Also Published As

Publication number Publication date
CN112969173A (en) 2021-06-15

Similar Documents

Publication Publication Date Title
CN110300107B (en) Vehicle networking privacy protection trust model based on block chain
Kaur et al. Security issues in vehicular ad-hoc network (VANET)
US10484351B2 (en) System and method for certificate selection in vehicle-to-vehicle applications to enhance privacy
EP3857928B1 (en) Method and system for intelligent transportation system certificate revocation list reduction
US8726019B2 (en) Context limited shared secret
US9276737B2 (en) Securing a command path between a vehicle and personal wireless device
Memon A secure and efficient communication scheme with authenticated key establishment protocol for road networks
CN103379170B (en) Handle the message received on vehicle
EP3637672B1 (en) V2x communication device and secured communication method thereof
US9756669B2 (en) Method of establishing a mobile-terminated packet data connection
JP2002540748A (en) Compliance with legal requirements for mobile devices
CN107396285A (en) Vehicle method for secret protection, device, equipment and storage medium
Boualouache et al. Towards an efficient pseudonym management and changing scheme for vehicular ad-hoc networks
JP2016048516A (en) Communication system, communication device, automobile, and communication method
Arain et al. Privacy protection with dynamic pseudonym-based multiple mix-zones over road networks
CN114697945B (en) Method and device for generating discovery response message and method for processing discovery message
Huang et al. A privacy-preserving scheme for location-based services in the internet of vehicles
Nema et al. Analysis of Attacks and Challenges in VANET
KR102404271B1 (en) Method and apparatus for protecting privacy of vehicle location
CN112969173B (en) Position privacy protection method and system in 5G vehicle-mounted network based on virtual vehicle
CN108712432A (en) A kind of location privacy protection method of the vehicle-mounted social networks based on agency
Haidar et al. C-ITS PKI protocol: Performance evaluation in a real environment
CN111988763B (en) Bus-networking position privacy protection method based on bus cache
CN115459972A (en) Safe anonymous core network access method based on multi-unmanned aerial vehicle relay
Lee et al. Performance analysis of secure beaconing messages for GeoNetworking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230925

Address after: 410000 Room 110, Comprehensive Building, Changsha Jinxiang Copper Industry Co., Ltd., Muyun Industrial Park, Tianxin District, Changsha City, Hunan Province

Patentee after: Hunan Renault Technology Development Co.,Ltd.

Address before: No. 3510, floor 35, building 1, No. 500, middle section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610000

Patentee before: Sichuan qianyiding Technology Co.,Ltd.

Effective date of registration: 20230925

Address after: No. 3510, floor 35, building 1, No. 500, middle section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610000

Patentee after: Sichuan qianyiding Technology Co.,Ltd.

Address before: 453000 No.699 Pingyuan Road, Hongqi District, Xinxiang City, Henan Province

Patentee before: HENAN INSTITUTE OF TECHNOLOGY

TR01 Transfer of patent right