Background
In recent years, 5G technology has seen a qualitative leap. Due to the improvements of the method in delay, system capacity, spectrum efficiency, communication range and channel reliability, and the characteristic of supporting device-to-device communication, the method brings huge opportunity for the development of the mobile internet industry.
So-called vehicle networks (VANETs) are distributed ad-hoc networks formed by many different types of vehicles communicating with other entities in a wireless network environment by means of their installed on-board units (OBUs). In order to improve the driving experience of the vehicle owner and ensure the safety of the vehicle owner, the vehicle needs to periodically broadcast safety information including information such as position, speed, orientation and acceleration to surrounding vehicles. Although the safety of vehicle driving in the Internet of vehicles is guaranteed to a certain extent, the leakage of safety information can threaten the position privacy of the vehicle owner, and an adversary can obtain the personal privacy of the vehicle owner through the position information of the vehicle, including the home address, the work unit and the like of the vehicle owner, so that great danger can be brought to the vehicle owner. The internet of vehicles must therefore provide a sufficiently powerful location privacy protection mechanism to ensure that the privacy of the vehicle owners can be protected.
The conventional solution considers the method of using pseudonyms to achieve location privacy, i.e., vehicles broadcast security information using pseudonyms to prevent tracking by adversaries. Unfortunately, in these solutions, the number of vehicles is limited to the pseudonymization, and in the case of a small number of vehicles, blindly performing the pseudonymization poses a great security threat, but the privacy of the vehicle location is still compromised by using the same pseudonymization for a long time. Meanwhile, the vehicle pseudonym replacement areas considered by the schemes do not include areas with high position privacy requirements, such as government offices, hospitals and the like, and the position privacy of the vehicle in the areas needs to be protected urgently.
The 5G technology has the characteristics of high reliability, low time delay and the like, connection can be established between vehicles more quickly, efficient communication cooperation is realized, and therefore the position privacy of the vehicles is protected. However, no technology currently considers location privacy protection in the case where there are a small number of vehicles in a location privacy sensitive area and a pseudonymous change area in a 5G internet of vehicles.
Disclosure of Invention
The invention aims to: the invention aims to solve the defects in the prior art and provides a method and a system for protecting the position privacy in a 5G vehicle-mounted network based on a virtual vehicle.
The technical scheme is as follows: the invention discloses a position privacy protection method in a 5G vehicle-mounted network based on virtual vehicles, which comprises the following steps:
step S1, system initialization
All vehicles are registered in a trusted center TA, and information to be used in the journey, including a public key for communication, is obtained
Private key
And certificate Cert
i And pseudonym public key for transmitting security information
Private key
And certificate
Meanwhile, the vehicle initializes a pseudonymous policy management module PAMM;
step S2, sensitive area adding
The vehicle can monitor the position of the vehicle in real time in the driving process, and if the vehicle reaches a sensitive area SA j Then, it will contact the edge server ES j Negotiating session keys if the vehicle does not reach the sensitive area SA j If so, no response is made;
step S3, pseudonym exchange
When the vehicle is in the sensitive area SA j If so, using the pseudonymous name to broadcast the safety information, and entering a pseudonymous name replacement preparation stage, namely determining whether to participate in the pseudonymous name replacement according to the information interaction with the edge server by the vehicle, and performing a formal pseudonymous name replacement process after determining to perform the pseudonymous name replacement, wherein a pseudonymous name replacement strategy of the vehicle in a sensitive area is calculated by a pseudonymous name strategy management module PAMM;
step S4, leaving sensitive area
When the vehicle judges that the position of the vehicle does not belong to the sensitive area SA j When it is time, delete with edge server ES j Session information of (2); if edge server ES j And deleting the conversation message with the corresponding vehicle if the message sent by the vehicle is not received in the corresponding time period.
Further, the detailed process of step S1 is as follows:
s1.1, the vehicle stores the information sent by the credible center TA in an on-board unit OBU, and stores a pseudonym set in a pseudonym pool in the vehicle;
step S1.2, the vehicle updates pseudonym table according to the update table in the pseudonym policy management module PAMM, the sensitive area management mechanism SAMD sends part of sensitive area coordinates and corresponding information to the vehicle, and the vehicle updates the update table in the pseudonym policy management module PAMM according to the information after receiving the information to prepare for subsequent pseudonym replacement.
Further, the detailed process of step S1.2 is:
each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, wherein the pseudonymous name strategy management module PAMM comprises a pseudonym table and an update table; initializing a pseudonymous name policy management module (PAMM) before a vehicle runs:
firstly, updating a pseudonym table according to an update table in a pseudonym policy management module (PAMM), wherein the pseudonym table is used for selecting pseudonym policies in the current journey, and the table content of the pseudonym is unchanged in the driving process of a vehicle; secondly, the pseudonym policy management module PAMM preloads the table entries of the update table according to the coordinate information of the sensitive area sent by the sensitive area management mechanism SAMD, the update table is dynamic in the driving process, and when the vehicle passes through the sensitive area, the pseudonym policy management module PAMM updates the table through a corresponding algorithm, thereby obtaining a table quantifying the position privacy requirement.
Further, the detailed process of step S2 is as follows:
s2.1, the vehicle obtains the position of the vehicle through a Global Positioning System (GPS) in the running process and converts the position into the coordinate system coordinate { x ] of the affiliated area i ,y i ,z i };
Step S2.2, edge server ES j Periodically broadcasting the information of the sensitive area managed by the vehicle, and when the vehicle receives the information, the vehicle coordinates x according to the coordinate system i ,y i ,z i Checking if it is in the sensitive area SA j :
If the vehicle is located in the sensitive area SA j The vehicle will execute the update table update algorithm while the vehicle and edge server ES are running j Negotiating and calculating a session key sk for subsequent communication; if the vehicle is not in the sensitive area SA j No response is made.
Further, the details of the pseudonym replacement preparation stage in step S3 are as follows:
s3.1.1, edge server ES j Sending a pseudonym exchange preparation message E to the vehicle having negotiated the session key sk (SA j ||content||Ready||Cert ESj Ts); content denotes the message content, Ts is the time stamp, Cert ESj Refers to the certificate of the edge server, and Ready refers to the message type for preparing the message for replacement;
s3.1.2, after the vehicle receives the message, it verifies whether the message is legal, if so, it sends the value in the update table to the edge server ES j If not, rejecting the message;
s3.1.3, edge server ES
j After receiving the value message, determining the number of false vehicles which need to be increased finally according to the value values sent by all vehicles, and sending replacement initial information to the corresponding vehicles
N
v The number of vehicles for changing the pseudonyms is represented, and totalnumber refers to the number of real vehicles participating in the pseudonym change in the local area;
s3.1.4, when the vehicle receives the replacement initial information, it decides whether to participate in the pseudonym replacement, and sends the pseudonym replacement policy to the edge server ES j ;
S3.1.5, edge server ES j Statistics of what was sent in step S3.1.4The information is available, and the final number of vehicles participating in the pseudonymization is known.
The specific method of the step S3.1.4 is as follows:
assuming that the utility function of vehicle pseudonym replacement is U (C), continuously maintaining the utility function of the current pseudonym as U (M), firstly, the vehicle calculates the values of U (C) and U (M), and when U (C) is more than or equal to U (M), the vehicle will perform pseudonym replacement; otherwise, when U (C)<U (M), the vehicle will choose to keep the original pseudonym PID i,k 。
Further, the details of formally performing the pseudonymous name replacement in step S3 are as follows:
s3.2.1, edge server ES
j Sending a specific change message to all vehicles participating in the pseudonym change
S3.2.2, after the vehicle receives the replacement message, it first verifies if the message is legal, if yes, the pseudonym identity is replaced at time
If the message is rejected without rules, the original pseudonym PID is continuously used
i,k Broadcasting a security message;
wherein,
in turn a vehicle V
i The public key, the private key and the certificate of the kth pseudonym.
The invention also discloses a system for realizing the position privacy protection method in the virtual vehicle-based 5G vehicle-mounted network, which comprises the following entities: trusted center TA, 5G-base station 5G-BS, sensitivity management organization SAMD, edge server ES j And a vehicle; each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous name pool and a pseudonymous name strategy management module PAMM, the vehicle is communicated with other entities through a wireless communication module in OBU equipment, the global positioning system GPS acquires the real-time position of the vehicle, the pseudonymous name pool is used for storing pseudonymous names, and the pseudonymous name strategy management module PAMM calculates a pseudonymous name replacement strategy of the vehicle;and the pseudonym policy management module PAMM includes a pseudonym table including a Number, a Coordinate, a Value, and a Flag, and an update table including a Number, a Coordinate, an Arrival, and a Flag.
Has the advantages that: compared with the prior art, the invention has the following advantages and disadvantages:
(1) the invention provides a virtual vehicle-based location privacy protection method suitable for a 5G vehicle networking, which solves the problem that the traditional pseudonym replacement is limited by the number of vehicles and provides more comprehensive location privacy protection;
(2) the invention expands the pseudonymous name replacing area from social hotspot spots area to sensitive area, uses some places needing high-level position privacy protection, such as government organs, hospitals and the like, as the place for pseudonymous name replacement, and quantifies the position privacy requirement of the vehicle by using the visit times of the vehicle, thereby realizing a more practical privacy protection scheme;
(3) the invention designs a pseudonym replacement game, pseudonym replacement can be carried out only by vehicles meeting conditions, pseudonym replacement strategies of different vehicles can be different, personalized position privacy is realized, and meanwhile, the invention also provides a new position privacy measurement standard.
Detailed Description
The technical solution of the present invention is described in detail below, but the scope of the present invention is not limited to the embodiments.
As shown in fig. 1 and fig. 2, the system for implementing the location privacy protection method in the virtual vehicle-based 5G vehicular network of the present embodiment includes the following entities: trusted center TA, 5G-base station 5G-BS, sensitivity management organization SAMD, edge server ES j And each vehicle.
Each vehicle comprises a vehicle-mounted unit OBU, a global positioning system GPS, a pseudonymous pool and a pseudonymous strategy management module PAMM; the system comprises a Global Positioning System (GPS) and a pseudonym pool, wherein the wireless communication module in the OBU equipment is used for communicating with other entities, the GPS is used for acquiring the real-time position of a vehicle, and the pseudonym pool is used for storing pseudonyms; the pseudonym policy management module PAMM is used to calculate a pseudonym replacement policy for the vehicle.
The pseudonym policy management module includes a pseudonym table and an update table, as shown in fig. 3 and 4, the pseudonym table includes entries such as a Number, a Coordinate, a Value, a Flag, and the like, and the update table includes entries such as a Number, a Coordinate, an Arrival, a Value, a Flag, and the like.
The method for protecting the position privacy in the virtual vehicle-based 5G Internet of vehicles comprises the following steps:
(1) initialization:
(1.1) the trusted center TA generates system corresponding parameters, preloads the system parameters to the OBU of the vehicle through a safe communication channel, and simultaneously sends identity information required to be used in the driving process to the vehicle
And pseudonym information
(1.2) the vehicle updates pseudonym table according to the update table in the pseudonym policy management module PAMM, meanwhile, the sensitive area management mechanism SAMD sends part of sensitive area coordinates and corresponding information to the vehicle, and after the vehicle receives the message, the vehicle updates the update table in the pseudonym policy management module PAMM according to the message, so as to prepare for subsequent pseudonym replacement, and the specific implementation is as follows:
(1.2.1) updating pseudonym table with the contents of update table for vehicle;
(1.2.2) sensitive area management agency SAMD sends coordinates (x) of the sensitive area to the vehicle i ,y i ,z i ) Wherein i is more than or equal to 1 and less than or equal to N; the vehicle updates the coordinate items in the update table according to the received information.
(2) Adding a sensitive area:
(2.1) in the running process of the vehicle, the position coordinates of the vehicle can be obtained in real time through a Global Positioning System (GPS), and the position coordinates are converted into the coordinates { x) of the coordinate system of the region to which the vehicle belongs i ,y i ,z i };
(2.2) edge Server ES j Periodically broadcasts the sensitive area information managed by the vehicle, and when receiving the information, the vehicle checks whether the vehicle is located in the sensitive area SA j And performing the following operations:
(2.2.1) dynamically updating the update table by using the algorithm 1;
(2.2.2) if the vehicle is located in the area SA j Vehicle and edge server ES j The negotiation calculates a session key sk for subsequent communication.
(3) Kana change
The vehicle is positioned in the sensitive area, the kana broadcasting safety information is used, at the moment, the vehicle needs to decide whether to participate in the kana replacement according to the context information, and a formal kana replacement process is carried out after the kana replacement is decided; the specific process is as follows:
(3.1) pseudonym exchange preparation process:
(3.1.1) edge Server ES j To the car that has negotiated the conversation cipher keyVehicle transmitting pseudonym exchange preparation message E sk (SA j ||content||Ready||Cert ESj ||Ts);
(3.1.2) after the vehicle receives the message, the value in the update table is sent to the edge server ES j ;
(3.1.3) edge Server ES
j After receiving the message, determining the number of vehicles D equal to value required by the pseudonym replacement according to the value values sent by all vehicles
MAX K and sending replacement initial information to the vehicle
(3.1.4) when the vehicle receives the initial information of the replacement, the vehicle decides whether to participate in the pseudonym replacement or not and sends the pseudonym replacement strategy to the edge server ES j ;
The vehicle determines whether to participate in the kana replacement through the kana replacement game, and the vehicle makes a decision according to the current kana age and the context information. Assuming that the utility function of vehicle pseudonym replacement is U (C), continuously maintaining the utility function of the current pseudonym as U (M), firstly, the vehicle calculates the values of U (C) and U (M), and when U (C) is more than or equal to U (M), the vehicle will perform pseudonym replacement; otherwise, when u (c) < u (m), the vehicle will choose to keep the original pseudonym, which is implemented as follows:
in this embodiment, the pseudonymous entropy of the vehicle in a certain region is E ═ log
2 n, assuming the sensitive area is SA
j The vehicles in the region are collected as V ═ V
1 ,v
2 ,……,v
n The corresponding pseudonym policy set is S ═ S
1 ,S
2 ,……,S
n The function set of the replacement utility of the vehicle is U (C) ═ U (C)
1 ,U(C)
2 ,……,U(C)
n Maintain the utility function set of the pseudonym replacement as U (M) ═ U (M)
1 ,U(M)
2 ,……,U(M)
n V for any vehicle
i The replacement utility function can be expressed as
c is the cost of pseudonymization; the maintenance utility function can be expressed as U
i (M)=w(Z-△t)+(1-w)log
2 n is the same as the formula (I). When N is more than or equal to N
v Time, vehicle calculation
When n is a value of<N
v When the vehicle will calculate
Value of (D), if U
i >0, vehicle setting strategy S
i 1, indicates that a pseudonym change is to be made, whereas S is reversed
i 0 indicates that no pseudonym replacement is performed.
(3.1.5) edge Server ES j All information is counted, and the final number of vehicles participating in the pseudonymization is obtained.
And (3.2) pseudonym replacement implementation process:
(3.2.1) edge Server ES
j Sending a specific change message to all vehicles participating in the pseudonym change
time represents the time of the pseudonym change of the current round;
(3.2.2) after the vehicle receives the message, firstly, verifying whether the message is legal or not, and if so, replacing the pseudonym identity with the pseudonym identity at the time
Otherwise, the message is rejected and the original pseudonym PID is continuously used
i,k A security message is broadcast.
(4) Sensitive area departure
When the vehicle judges that the position of the vehicle does not belong to the sensitive area SA j When it is time, the ES with the edge server will be deleted j Session information of (2); if edge server ES j If the message sent by the vehicle is not received within a period of time, the conversation message with the corresponding vehicle is deleted.
In order to show that the present invention can comprehensively implement location privacy protection, the embodiment uses a virtual pseudonym entropy as a location privacy measurement standard:
wherein
The probability of possible tracking is shown and compared with another internet of vehicles location privacy protection scheme MARP.
For convenience, this implementation defines some of the symbols as follows:
as shown in fig. 5, the magnitude of the entropy of the virtual pseudonyms obtainable with the MARP solution of the present invention and the prior art (the number of vehicles is set between 10 and 100) in the case where the number of vehicles is different. Fig. 6 and 7 show how the replacement utility function u (c) and the maintenance utility function u (m) are influenced by the pseudonym age and the number of vehicles.
In summary, in the invention, the vehicle broadcasts the safety message by the pseudonym, during the driving process, the vehicle firstly obtains the required position privacy protection requirement according to the self moving track to prepare for the next trip, meanwhile, when the vehicle reaches the sensitive area, the pseudonym replacing game is carried out according to the self pseudonym age, the context information and the self position privacy requirement degree, if the vehicle can obtain higher position privacy protection degree by the pseudonym replacing, the vehicle will carry out the pseudonym replacing, otherwise, the vehicle will continue to maintain the original pseudonym.