CN113676867A - Internet of vehicles frequency spectrum sharing excitation method, system, equipment, medium and terminal - Google Patents

Internet of vehicles frequency spectrum sharing excitation method, system, equipment, medium and terminal Download PDF

Info

Publication number
CN113676867A
CN113676867A CN202110647312.1A CN202110647312A CN113676867A CN 113676867 A CN113676867 A CN 113676867A CN 202110647312 A CN202110647312 A CN 202110647312A CN 113676867 A CN113676867 A CN 113676867A
Authority
CN
China
Prior art keywords
user
users
authorized
spectrum sharing
unauthorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110647312.1A
Other languages
Chinese (zh)
Other versions
CN113676867B (en
Inventor
李红宁
李荆一
裴庆祺
刘雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202110647312.1A priority Critical patent/CN113676867B/en
Publication of CN113676867A publication Critical patent/CN113676867A/en
Application granted granted Critical
Publication of CN113676867B publication Critical patent/CN113676867B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks

Abstract

The invention belongs to the technical field of vehicle networking frequency spectrum sharing, and discloses a vehicle networking frequency spectrum sharing excitation method, a system, equipment, a medium and a terminal, wherein the vehicle networking frequency spectrum sharing excitation method comprises the following steps: protecting the position privacy of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording the IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual money in the block chain as incentive; by restricting user behaviors such as paying a deposit, introducing an honesty evaluation mechanism and the like and introducing a structure that an intention list guarantees a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles. The method adopts an incentive mechanism based on position privacy protection, enhances the reliability of data through block chain distributed storage, and effectively incentivizes authorized users to actively participate in spectrum sharing on the basis of preventing the position privacy of the authorized users in the Internet of vehicles from being revealed.

Description

Internet of vehicles frequency spectrum sharing excitation method, system, equipment, medium and terminal
Technical Field
The invention belongs to the technical field of vehicle networking spectrum sharing, and particularly relates to a vehicle networking spectrum sharing excitation method, system, device, medium and terminal.
Background
At present, in the era of everything interconnection, with the deep promotion of electromotion, intellectualization, networking and sharing in the automobile industry in recent years, the development of the internet of vehicles is increasingly accelerated. The car networking industry is driven by triple factors of policy, capital and technology, and a good opportunity is provided for the explosion of the car networking industry due to the coming of the 5G commercial era. The construction aspect of 5G network infrastructure in China is ahead of the world, and the development opportunity brought to 5G by intelligent networking automobile and vehicle networking development is fully considered in the next step. If the data traffic between people is limited, the data traffic between people and vehicles, between vehicles and roads will increase in geometric progression, the vehicle networking communication depends on the traditional communication mode, the existing cellular communication network is utilized for data transmission, and with the increase of the service requirement of the cellular network and the application requirement of massive automobile terminals, the limited spectrum resources are difficult to meet the increasing requirement of vehicle networking equipment. The radio administration of the Ministry of industry and communications considers that: through fine management, the spectrum sharing of the middle and high frequency bands is realized, so that the spectrum utilization rate is improved, and the method is a good party for relieving the spectrum supply and demand contradiction. Therefore, in order to meet the increasingly scarce condition of spectrum resources caused by accessing mass equipment to the internet of vehicles, it is important to improve the utilization rate and the access efficiency of the limited spectrum resources through spectrum sharing.
The incentive mechanism plays an important role in spectrum sharing, currently, research on the spectrum sharing incentive mechanism at home and abroad mainly stimulates the idle spectrum of an authorized user to be perceived in a mutual cooperation mode from the perspective of the unauthorized user, effective measures for motivating the authorized user are not considered, then, only users in a network participate actively, spectrum sharing can be effectively implemented in the internet of vehicles, and research on the incentive measures of the authorized user is very important. In addition, the current research well protects the location privacy of unauthorized users, however, effective attention and research are less for incentive mechanisms supporting the location privacy protection of authorized users, and some authorized users are reluctant to share the idle frequency spectrum due to the worries about the leakage of the location privacy, because the leakage of the location privacy brings great risks to the authorized users, and an attacker can analyze the sensitive information of specific users, such as living habits, working places, social relations and the like, according to the location track of daily behaviors.
In summary, if the location privacy of the authorized user in the car networking cannot be protected, the selfishness of the authorized user will be further enhanced, and even the effective implementation of spectrum sharing in the car networking will be severely restricted, so as to prevent the location privacy of the authorized user in the car networking spectrum sharing from being revealed, and on this basis, the authorized user is encouraged to actively participate in the spectrum sharing, which becomes a problem that needs to be solved urgently at present.
Through the above analysis, the problems and defects of the prior art are as follows: the existing spectrum sharing incentive mechanism has less effective attention and research on the incentive mechanism for supporting the position privacy protection of authorized users, and the authorized users are reluctant to share the idle spectrum due to the worry of the position privacy disclosure, because the position privacy disclosure brings great risk to the authorized users, an attacker can analyze the sensitive information of specific users according to the position track of daily behaviors.
The difficulty and significance for solving the problems and defects are as follows:
in the vehicle networking spectrum sharing, authorized users need to submit position information in a certain range to a fusion center so as to make full use of idle spectrum of the authorized users, when a cloud layer is acquired by malicious users, the position privacy of the authorized users may be leaked, if a distributed K anonymous algorithm based on a block chain can be adopted, the accurate position information of the authorized users is fuzzily generalized to an anonymous space region, even if the malicious users break the cloud layer, only an anonymous region composed of the K position information can be obtained, the real position of the authorized users cannot be determined, and the position privacy of the authorized users in the spectrum sharing is protected.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a vehicle networking frequency spectrum sharing incentive method, a system, equipment, a medium and a terminal, in particular relates to a vehicle networking frequency spectrum sharing incentive method, a system, equipment, a medium and a terminal based on position privacy protection, and aims to solve the problem of position privacy disclosure of authorized users in vehicle networking frequency spectrum sharing.
The invention is realized in such a way, and the vehicle networking frequency spectrum sharing excitation method comprises the following steps:
protecting the privacy of the positions of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual currency in the block chain as incentive; by restraining user behaviors such as paying a deposit, introducing an integrity evaluation mechanism and the like, and introducing an intention list to ensure the structure of a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
Further, the internet of vehicles spectrum sharing incentive method comprises the following steps:
detecting the idle frequency spectrum of an authorized user by an unauthorized user, and sending a frequency spectrum sharing request so as to utilize the idle frequency spectrum of the authorized user;
step two, the authorized user receives the spectrum sharing request and triggers a position privacy protection mechanism to protect the position privacy of the authorized user;
thirdly, the unauthorized user participates in the construction of the K anonymous area of the authorized user through an intelligent contract on the monitoring block chain to assist in protecting the position privacy of the authorized user;
fourthly, the authorized users construct a K anonymous area, the K anonymous area and the spectrum sharing license are sent to a spectrum management center, the spectrum management center carries out spectrum allocation, and on the premise of protecting the position privacy of the authorized users, the free spectrum of the authorized users is allocated to the unauthorized users;
and fifthly, the miners distribute virtual money for the users, reward and punish the users according to the behaviors of the users, stimulate the authorized users to participate in spectrum sharing, stimulate the unauthorized users to participate in the construction of the anonymous area, and restrict the self-profit behaviors of the users.
Further, in step two, the step of receiving the spectrum sharing request by the authorized user and triggering the location privacy protection mechanism includes:
the method comprises the steps that an authorized user sends a position privacy protection request to an intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity degree of the authorized user, and if the integrity degree of the authorized user is smaller than 40, the intelligent contract rejects the position protection request; if the integrity of the authorized user is more than 40, the intelligent contract receives the position protection request of the authorized user, the authorized user pays a deposit according to the integrity of the authorized user, and the number of unauthorized users and integrity requirements required by constructing the anonymous K region structure are submitted.
Further, in step three, the unauthorized user participates in the construction of the K anonymous area of the authorized user through an intelligent contract on the monitoring block chain, including:
an unauthorized user selects whether to participate in K anonymous area construction of an authorized user or not through an intelligent contract on a monitoring block chain, the unauthorized user who is willing to participate in the anonymous area construction submits a request to the intelligent contract and is added into a wish list by the intelligent contract, and if the unauthorized user who submits the request meets the requirement of integrity, the unauthorized user is added into an anonymous group through the intelligent contract;
if the unauthorized users in the anonymous group meet the requirements of the authorized users, the anonymous group is successfully constructed, and all the unauthorized users in the anonymous group send the position information to the authorized users; and if the anonymous group does not have enough unauthorized users, the intelligent dating and sending the wishlist name list to the authorized users, and the authorized users resubmit the number and integrity requirements of the unauthorized users required by the K anonymous area construction, and reconstruct the anonymous group.
Further, in step five, the miner allocates virtual currency to the user, and rewards and punishment are performed on the user according to the behavior of the user, including:
if the user does not have the illegal behavior in the construction of the anonymous area, returning the deposit paid by the user, and increasing the integrity H of the user to:
Figure BDA0003109593370000041
and distributing currency for the user according to rules;
if the user has violation behaviors:
1) if the user PU is authorized0Identifying unauthorized users SU1Providing false location information to illegal user SU1The ID and violation information of (a) are broadcast in the block chain without receiving the user SU1Paid deposit
Figure BDA0003109593370000042
Honesty of the illegal user
Figure BDA0003109593370000043
And (3) reducing to:
Figure BDA0003109593370000044
2) if the user SU is not authorized1Identifying authorized users PU0The illegal user is PU when the illegal action occurs0The ID and the violation information are broadcasted in the block chain, and the deposit paid by the violation user is not collected
Figure BDA0003109593370000045
And creditability of the disqualified user
Figure BDA0003109593370000046
And (3) reducing to:
Figure BDA0003109593370000047
if the user PU is authorized0Identifying unauthorized users providing false location information in a certain anonymous zone structure but not certainIf the unauthorized user provides the false location information, then all the unauthorized users SU in the transaction bill are not receivediDeposit of (i ═ 1, 2, 3.., K) payment
Figure BDA0003109593370000051
And will be
Figure BDA0003109593370000052
And (3) reducing to:
Figure BDA0003109593370000053
further, the allocating money to the user according to the rule includes:
if the virtual currency generated by the mining is set as V, the number of unauthorized users participating in the construction of the anonymous area is set as K, and for the authorized users, if illegal behaviors of the authorized users are not found in the last five blocks and the blocks behind the last five blocks, the obtained virtual currency is set as V
Figure BDA0003109593370000054
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure BDA0003109593370000055
For each unauthorized user, if no violation is found in the last but one block and the blocks after the last block, the obtained virtual currency is
Figure BDA0003109593370000056
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure BDA0003109593370000057
The invention further aims to provide a vehicle networking frequency spectrum sharing excitation system applying the vehicle networking frequency spectrum sharing excitation method.
In the cloud layer, a fusion center combines the sensing data from all edge layers by using a data fusion algorithm to obtain a final sensing decision about the available frequency spectrum of an authorized user, and stores various data generated in the frequency spectrum sharing activity, including the ID of the user participating in the frequency spectrum sharing, the position information of the user and the like in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is sensed, and the idle spectrum resource of the authorized user is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, under the service requirement and application environment of the Internet of vehicles, the authorized users contribute idle spectrum resources, and the unauthorized users expect to obtain spectrum sharing opportunities.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
protecting the privacy of the positions of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual currency in the block chain as incentive; by restraining user behaviors such as paying a deposit, introducing an integrity evaluation mechanism and the like, and introducing an intention list to ensure the structure of a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
It is another object of the present invention to provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
protecting the privacy of the positions of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual currency in the block chain as incentive; by restraining user behaviors such as paying a deposit, introducing an integrity evaluation mechanism and the like, and introducing an intention list to ensure the structure of a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
The invention further aims to provide an information data processing terminal, and the information data processing terminal is used for realizing the internet of vehicles frequency spectrum sharing incentive system.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the vehicle networking spectrum sharing incentive method, the position privacy of authorized users in the vehicle networking spectrum sharing is protected by using a K-anonymous algorithm based on a block chain, and miners record IDs and position information of the authorized users and unauthorized users in the block chain as evidence to restrict the self-benefit behaviors of the authorized users and the unauthorized users in the construction process of an anonymous area; based on a designed location privacy protection scheme, in combination with a block chain technology, virtual currency in a block chain is issued to users as incentives, so that authorized users are encouraged to actively participate in spectrum sharing, and unauthorized users provide real locations to participate in the construction of anonymous areas; the method comprises the steps of constraining the self-profit behavior of a user by paying a deposit, introducing an integrity evaluation mechanism and reducing the income of an illegal user in n turns, determining the deposit to be paid by the user according to the integrity, performing two-way selection according to the integrity when an authorized user and an unauthorized user construct an anonymous area, and rejecting the position privacy protection requirement of the user when the integrity of the authorized user is lower than 40. In addition, in order to solve the problem that the position privacy protection fails because the authorized user has a too high requirement on the integrity of the unauthorized user or the number of the unauthorized users participating in the construction of the anonymous area is too large and enough unauthorized users do not participate in the construction of the anonymous area, a wish list is introduced, and after the construction of the anonymous area fails, the authorized user can readjust the requirement according to the wish list.
The invention adopts an incentive mechanism based on position privacy protection, and can effectively encourage authorized users to actively participate in spectrum sharing on the basis of preventing the position privacy of the authorized users in the Internet of vehicles from being leaked. Meanwhile, the position privacy protection technology used by the invention is based on the block chain, the block chain distributed storage can enhance the reliability of data, and the storage has the characteristic of duplicate removal, so that the more users, the lower the cost, and the prevention of the position leakage of the unauthorized user by the authorized user and the deception of the unauthorized user by the false position provided by the unauthorized user in the distributed anonymous region construction process.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a spectrum sharing incentive method for internet of vehicles according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a spectrum sharing excitation method for the internet of vehicles according to the embodiment of the invention.
Fig. 3 is a structural diagram of a spectrum sharing incentive system of the internet of vehicles according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of an application scenario provided in the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Aiming at the problems in the prior art, the invention provides a vehicle networking frequency spectrum sharing excitation method, system, equipment, medium and terminal, and the invention is described in detail with reference to the accompanying drawings.
As shown in fig. 1, the spectrum sharing incentive method for the internet of vehicles according to the embodiment of the present invention includes the following steps:
s101, an unauthorized user detects the idle frequency spectrum of an authorized user and sends a frequency spectrum sharing request so as to utilize the idle frequency spectrum of the authorized user;
s102, an authorized user receives the spectrum sharing request and triggers a position privacy protection mechanism to protect the position privacy of the authorized user;
s103, an unauthorized user participates in the construction of a K anonymous area of an authorized user through an intelligent contract on a monitoring block chain, and the position privacy of the authorized user is protected in an assisting manner;
s104, authorized users construct a K anonymous area, the K anonymous area and spectrum sharing permission are sent to a spectrum management center, the spectrum management center carries out spectrum allocation, and on the premise of protecting the position privacy of the authorized users, the free spectrum of the authorized users is allocated to unauthorized users;
and S105, the miners distribute virtual currency to the users, reward and punish the users according to the behaviors of the users, stimulate the authorized users to participate in spectrum sharing, stimulate the unauthorized users to participate in the construction of anonymous areas, and restrict the self-profit behavior of the users.
The schematic diagram of the spectrum sharing excitation method for the internet of vehicles provided by the embodiment of the invention is shown in fig. 2.
As shown in fig. 3, the spectrum sharing incentive system for the internet of vehicles according to the embodiment of the present invention includes a cloud layer, an edge layer, and a user layer.
In the cloud layer, a fusion center combines the sensing data from all edge layers by using a data fusion algorithm to obtain a final sensing decision about the available frequency spectrum of an authorized user, and stores various data generated in the frequency spectrum sharing activity, including the ID of the user participating in the frequency spectrum sharing, the position information of the user and the like in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is sensed, and the idle spectrum resource of the authorized user is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, under the service requirement and application environment of the Internet of vehicles, the authorized users contribute idle spectrum resources, and the unauthorized users expect to obtain spectrum sharing opportunities.
The technical solution of the present invention will be further described with reference to the following examples.
The invention provides a vehicle networking frequency spectrum sharing incentive mechanism based on position privacy protection, which utilizes a K-anonymity algorithm based on a block chain to protect the position privacy of authorized users in the vehicle networking frequency spectrum sharing, and miners record IDs and position information of the authorized users and unauthorized users in the block chain as evidence to restrict the self-profit behaviors of the authorized users and the unauthorized users in the construction process of an anonymous area; based on a designed location privacy protection scheme, in combination with a block chain technology, virtual currency in a block chain is issued to users as incentives, so that authorized users are encouraged to actively participate in spectrum sharing, and unauthorized users provide real locations to participate in the construction of anonymous areas; the method comprises the steps of constraining the self-profit behavior of a user by paying a deposit, introducing an integrity evaluation mechanism and reducing the income of an illegal user in n turns, determining the deposit to be paid by the user according to the integrity, performing two-way selection according to the integrity when an authorized user and an unauthorized user construct an anonymous area, and refusing the position privacy protection requirement of the user when the integrity of the authorized user is lower than 40. In addition, in order to solve the problem that the position privacy protection fails because the authorized user has a too high requirement on the integrity of the unauthorized user or the number of the unauthorized users participating in the construction of the anonymous area is too large and insufficient unauthorized users participate in the construction of the anonymous area, a wisdom name list is introduced, and after the construction of the anonymous area fails, the authorized user can readjust the requirement according to the wisdom name list.
In order to achieve the above object, the method comprises the following steps:
step one, an unauthorized user acts as an edge server, senses the spectrum use condition of an authorized user, detects the idle spectrum of the authorized user and sends a spectrum sharing request, and accesses the idle spectrum resource of the authorized user on the premise of not interfering the authorized user;
and step two, assuming that safe communication links exist among users and between the users and the fusion center, authorized users and unauthorized users can send and receive messages to the block chain intelligent contract, and each user has a public-private key pair of the user and can sign the content sent by the user, so that the uniqueness and the non-repudiation of the transaction content are ensured. Under the service requirement and application environment of the Internet of vehicles, authorized users receive spectrum protection requests of unauthorized users and choose to accept or reject spectrum sharing. When an authorized user agrees to share the idle spectrum, a location privacy protection model based on a block chain is triggered to protect the location privacy of the authorized user, and a location protection requirement is sent to an intelligent contract to acquire the real location of the unauthorized user to construct an anonymous area, specifically comprising the following steps:
the method comprises the steps that an authorized user sends a position privacy protection request to an intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity degree of the authorized user, when the integrity degree of the authorized user is larger than 40, the intelligent contract accepts the position protection request of the authorized user, the authorized user pays a deposit according to the integrity degree of the authorized user, and the number of unauthorized users and the integrity degree requirement required by constructing a K anonymous area are provided.
Step three, an unauthorized user checks when someone seeks anonymous help by monitoring an intelligent contract on a block chain network, and selects whether to participate in an anonymous area structure according to the honesty degree of an authorized user, if the unauthorized user wishes to participate in the anonymous area structure, a request is sent to the intelligent contract, if the request meets the requirement of the authorized user, an anonymous group is added, and position information is sent to the authorized user so that the authorized user can construct the anonymous area, and the method specifically comprises the following steps:
the unauthorized user selects whether to participate in the anonymous zone structure of the authorized user through an intelligent contract on a monitoring block chain, the unauthorized user who intentionally participates in the anonymous zone structure is added into a wish list by the intelligent contract, the integrity requirement is met, and the unauthorized user who intentionally participates in the anonymous zone structure and the authorized user form an anonymous group. If the unauthorized users in the anonymous group do not meet the requirements of the authorized users, the willingness list is sent to the authorized users, the authorized users resubmit the number and the integrity requirements of the unauthorized users needed by the anonymous area construction, if the authorized users in the anonymous group meet the requirements of the unauthorized users, the anonymous group construction is successful, and the unauthorized users in the anonymous group send the position information to the authorized users.
After receiving the position information of the unauthorized user, the authorized user constructs an anonymous area, sends the anonymous area and the frequency spectrum sharing license to a frequency spectrum management center, and the frequency spectrum management center carries out frequency spectrum distribution;
and fifthly, the miners distribute virtual currency for the users and pay reward and punishment to the users according to the behaviors of the users. The method specifically comprises the following steps:
1) if the virtual currency generated by the mining is set as V, the number of unauthorized users participating in the anonymous area structure is set as K, and for authorized users, if illegal behaviors of the authorized users are not found on the last five blocks and the blocks behind the last five blocks, the obtained virtual currency is set as V
Figure BDA0003109593370000101
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure BDA0003109593370000102
2) For each unauthorized user, if the violation is not found in the last five blocks and the blocks after the last five blocks, the obtained virtual currency is
Figure BDA0003109593370000103
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure BDA0003109593370000104
As shown in fig. 3, the system structure diagram for spectrum sharing in the internet of vehicles provided by the embodiment of the present invention includes a cloud layer, an edge layer, and a user layer. In the cloud layer, the fusion center uses a data fusion algorithm to combine the sensing data from all the edge layers to obtain a final sensing decision about the available spectrum of the authorized user, and stores various data generated in spectrum sharing activities, including the ID of the user participating in spectrum sharing, the position information of the user and the like in the cloud. In the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is sensed, and the idle spectrum resource of the authorized user is accessed on the premise of not interfering the authorized user. The user layer mainly comprises authorized users and unauthorized users, under the service requirements and application environments of the Internet of vehicles, the authorized users contribute idle spectrum resources, and the unauthorized users expect to obtain spectrum sharing opportunities.
As shown in fig. 4, the application scenario of the present invention is spectrum sharing in the car networking, and the spectrum sharing is composed of unauthorized users, authorized users, and a fusion center, without a third party, assuming that there are secure communication links between users, and between users and the fusion center, and the authorized users and the unauthorized users can send and receive messages to a blockchain intelligent contract, and each user has a private and public key pair of its own, and can sign the content sent by itself, thereby ensuring the uniqueness and non-repudiation of the transaction content. In the Internet of vehicles, an unauthorized user senses an idle frequency spectrum of an authorized user, sends a frequency spectrum sharing request, the authorized user selects to accept or reject frequency spectrum sharing, when the authorized user agrees to share the idle frequency spectrum, a position privacy protection model based on a block chain is triggered, a position protection requirement is sent to an intelligent contract to obtain the real position of the unauthorized user, an anonymous area is constructed, the anonymous area is submitted to a fusion center together with a frequency spectrum sharing license, and the fusion center distributes the frequency spectrum for the unauthorized user.
The technical effects of the present invention will be further described with reference to simulation experiments.
1. Conditions of the experiment
In the scene of spectrum sharing of the Internet of vehicles, a simulation operation system is an Intel (R) core (TM) i7-10700@2.90GHz and a 64-bit Windows operation system, a platform is divided into two parts, namely a distributed anonymous area cooperation construction block chain construction part and a data processing part, the platform of the distributed anonymous area cooperation construction block chain is an Ethereum1.5.5 version, and the data processing part adopts python 3.8.
2. Results and analysis of the experiments
In the internet of vehicles spectrum sharing, the existing research ignores the incentive mechanism of authorized users, but the research on the incentive mechanism of the authorized users is very important. The incentive mechanism based on the position privacy protection provided by the invention adopts the process of constructing the anonymous area and the position information of the user by adopting the block chain storage, does not need a third-party mechanism, but stores transaction data in a distributed manner, can effectively solve the problems of insufficient computing resources and the like in a centralized mode, and when part of public chain nodes are attacked by distributed denial of service, other public block chain nodes can still normally work and store all transaction records, so that the system of the whole incentive mechanism is prevented from being crashed; secondly, the invention adopts a K anonymity technology to confuse the one-to-one corresponding relation between the identity information and the position information, thereby protecting the position privacy of authorized users in the spectrum sharing, and each user on the public block chain only uses a string of digital accounts as an agent, and initially constructs a K anonymity group by a pseudonymization mechanism, thereby greatly improving the security. The incentive model only hides the corresponding relation between the identity information and the position information, but retains accurate position data, fully considers the integrity of the user when selecting the K anonymous group member, receives deposit to restrict the self-profit behavior of the user to a certain extent, improves the success rate of forming the K anonymous group, protects the position privacy of the user and provides higher service quality. In addition, because the incentive mechanism provided by the invention is realized based on the block chain system, the users in the block chain system use pseudonyms, the connection between the user name and the real identity of the user is cut off, and the two communication parties or a third party can not acquire the real identity of the communication node, thereby avoiding that a malicious node acquires the real identity of the user; and the information stored in the blockchain is difficult to be altered, once the selfish and selfish behaviors of authorized users and unauthorized users in the construction process of the anonymous area are found, the information stored in the blockchain can be used as evidence to punish dishonest users. And finally, an excitation mechanism of the block chain enables authorized users in the network to actively participate in spectrum sharing, unauthorized users actively participate in anonymous group construction, and the anonymous group generation efficiency is improved while the privacy of the users is protected.
When the authorized user adopts the method and the system to protect the position privacy, the average calculation delay presentation trend required by the authorized user to successfully construct the anonymous area increases along with the continuous increase of the privacy protection requirement K. For the unauthorized user, the average calculation time delay is independent of the privacy protection requirement K value of the authorized user. The reason for this is that as the value of K increases, the number of times that the authorized user needs to verify the correctness of the signature data sent by the unauthorized user and decrypt to obtain the true location of the collaborating user increases. However, for the unauthorized user, after the anonymous area sent by the unauthorized user constructs a request through an intelligent contract on the monitoring block chain network, the unauthorized user only needs to send a ciphertext of the true position of the unauthorized user encrypted by using the public key of the requesting user and signature data corresponding to the ciphertext to the authorized user, so that the average calculation delay required by the unauthorized user is irrelevant to the value K. Furthermore, the average communication overhead required by authorized users during the construction of an anonymous zone increases as the value of K required for privacy protection of authorized users increases. The reason for this is that as the value of K becomes larger, the authorized user needs to receive more location information provided by unauthorized users to construct an anonymous area, thereby increasing the average communication overhead of the authorized user. However, for the unauthorized user, since the authorized user is provided with its own true location in a peer-to-peer communication manner, the average communication overhead required by the unauthorized user does not change with the change of the privacy protection requirement K value of the authorized user. Under the condition that the number of users in the network is fixed, the anonymization processing time is increased along with the increase of the K value of the anonymous area, the more times of recursive query are needed, the more time is spent, and the position privacy of an authorized user can be better protected. In addition, the number of users in the network is inversely proportional to the time of constructing the anonymous area under the condition that the value of K is fixed, the more users in the network, the less time is spent, and when the number of users in the network is insufficient, the anonymous area construction can be failed; and the larger the k value required by the authorized user in the limited time, the higher the requirement on the number of users in the network.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When used in whole or in part, is implemented in a computer program product that includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the invention may be generated in whole or in part when the computer program instructions are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk (ssd)), among others.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made by those skilled in the art within the technical scope of the present invention disclosed in the present invention should be covered within the scope of the present invention.

Claims (10)

1. A vehicle networking spectrum sharing excitation method is characterized by comprising the following steps: protecting the position privacy of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording the IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual money in the block chain as incentive; by restricting user behaviors such as paying a deposit, introducing an honesty evaluation mechanism and the like and introducing a structure that an intention list guarantees a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
2. The internet of vehicles spectrum sharing incentive method of claim 1, wherein the internet of vehicles spectrum sharing incentive method comprises the steps of:
step one, an unauthorized user detects an idle frequency spectrum of an authorized user and sends a frequency spectrum sharing request;
step two, the authorized user receives the spectrum sharing request and triggers a position privacy protection mechanism;
step three, the unauthorized user participates in the K anonymous area construction of the authorized user through an intelligent contract on the monitoring block chain;
step four, the authorized user constructs a K anonymous area, and sends the K anonymous area and the spectrum sharing license to a spectrum management center, and the spectrum management center carries out spectrum allocation;
and fifthly, the miners distribute virtual currency for the users and pay reward and punishment to the users according to the behaviors of the users.
3. The vehicle networking spectrum sharing incentive method according to claim 2, wherein in the second step, the authorized user accepts the spectrum sharing request and triggers a location privacy protection mechanism, comprising:
the method comprises the steps that an authorized user sends a position privacy protection request to an intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity of the authorized user, and if the integrity of the authorized user is smaller than 40, the intelligent contract rejects the position protection request; if the integrity of the authorized user is more than 40, the intelligent contract receives the position protection request of the authorized user, the authorized user pays a deposit according to the integrity of the authorized user, and the number of unauthorized users and integrity requirements required by constructing the anonymous K region structure are submitted.
4. The internet of vehicles spectrum sharing incentive method of claim 2, wherein in step three, the unauthorized user participates in K anonymous area construction of authorized user by monitoring intelligent contracts on blockchains, comprising:
an unauthorized user selects whether to participate in a K anonymous zone structure of an authorized user or not through an intelligent contract on a monitoring block chain, the unauthorized user who is willing to participate in the anonymous zone structure submits a request to the intelligent contract and is added into a wish list by the intelligent contract, and if the unauthorized user who submits the request meets the integrity requirement, the unauthorized user is added into an anonymous group by the intelligent contract;
if the unauthorized users in the anonymous group meet the requirements of the authorized users, the anonymous group is successfully constructed, and all the unauthorized users in the anonymous group send the position information to the authorized users; and if the anonymous group does not have enough unauthorized users, the intelligent dating sends the wishlist name list to the authorized users, the authorized users resubmit the number of the unauthorized users and the integrity requirement required by the K anonymous area construction, and the anonymous group is reconstructed.
5. The vehicle networking spectrum sharing incentive method according to claim 2, wherein in step five, the miners distribute virtual currency to the users, and reward and punish the users according to behaviors of the users, and the method comprises the following steps:
if the user does not have the illegal behavior in the construction of the anonymous area, returning the deposit paid by the user, and increasing the integrity H of the user to:
Figure FDA0003109593360000021
and distributing currency for the user according to rules;
if the user has violation behaviors:
1) if the user PU is authorized0Identifying unauthorized users SU1Providing false location information to illegal user SU1The ID and violation information of (a) are broadcast in the block chain without receiving the user SU1Paid deposit
Figure FDA0003109593360000022
Honesty of the illegal user
Figure FDA0003109593360000023
And (3) reducing to:
Figure FDA0003109593360000024
2) if the user SU is not authorized1Identifying authorized users PU0The illegal user is PU when the illegal action occurs0The ID and the violation information are broadcasted in the block chain, and the deposit paid by the violation user is not collected
Figure FDA0003109593360000025
And creditability of the illegal user
Figure FDA0003109593360000026
And (3) reducing to:
Figure FDA0003109593360000027
if the user PU is authorized0If it is confirmed that there is an unauthorized user providing false location information in a certain anonymous zone structure, but it cannot be determined which unauthorized user provides false location information, then all the unauthorized users SU in the transaction bill are not receivediDeposit of (i ═ 1, 2, 3.., K) payment
Figure FDA0003109593360000028
And will be
Figure FDA0003109593360000029
And (3) reducing to:
Figure FDA00031095933600000210
6. the internet of vehicles spectrum sharing incentive method of claim 5, wherein the allocating money for users according to rules comprises:
if the virtual currency generated by the mining is V and the number of unauthorized users participating in the anonymous area structure is K, for the authorized users, if the authorized users do not search for the last five blocks and the blocks after the last five blocksBy its violation, the virtual currency it obtains is
Figure FDA0003109593360000031
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure FDA0003109593360000032
For each unauthorized user, if the violation is not found in the last five blocks and the blocks after the last five blocks, the obtained virtual currency is
Figure FDA0003109593360000033
If the last five blocks and the blocks after the last five blocks have the records of the illegal behaviors, the obtained virtual currency is
Figure FDA0003109593360000034
7. The vehicle networking spectrum sharing incentive system for implementing the vehicle networking spectrum sharing incentive method according to any one of claims 1 to 6, is characterized by comprising a cloud layer, an edge layer and a user layer;
in the cloud layer, a fusion center combines the sensing data from all edge layers by using a data fusion algorithm to obtain a final sensing decision about the available frequency spectrum of an authorized user, and stores various data generated in the frequency spectrum sharing activity, including the ID of the user participating in the frequency spectrum sharing, the position information of the user and the like in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is sensed, and the idle spectrum resource of the authorized user is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, under the service requirement and application environment of the Internet of vehicles, the authorized users contribute idle spectrum resources, and the unauthorized users expect to obtain spectrum sharing opportunities.
8. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
protecting the position privacy of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording the IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual money in the block chain as incentive; by restricting user behaviors such as paying a deposit, introducing an honesty evaluation mechanism and the like and introducing a structure that an intention list guarantees a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
9. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
protecting the position privacy of authorized users in the vehicle networking spectrum sharing by adopting a K anonymity algorithm based on a block chain, recording the IDs and position information of the authorized users and unauthorized users in the block chain as evidence, and issuing virtual money in the block chain as incentive; by restricting user behaviors such as paying a deposit, introducing an honesty evaluation mechanism and the like and introducing a structure that an intention list guarantees a K anonymous area, authorized users are encouraged to actively participate in spectrum sharing on the basis of protecting the privacy of the positions of the authorized users in the spectrum sharing of the Internet of vehicles.
10. An information data processing terminal, characterized in that the information data processing terminal is used for implementing the vehicle networking spectrum sharing incentive system according to claim 7.
CN202110647312.1A 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal Active CN113676867B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110647312.1A CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110647312.1A CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Publications (2)

Publication Number Publication Date
CN113676867A true CN113676867A (en) 2021-11-19
CN113676867B CN113676867B (en) 2023-11-07

Family

ID=78538164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110647312.1A Active CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Country Status (1)

Country Link
CN (1) CN113676867B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100257036A1 (en) * 2009-04-02 2010-10-07 Nec Laboratories America, Inc. Method and System for Anonymity and Incentives in User-Assisted Mobile Services
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
US20180307859A1 (en) * 2013-11-01 2018-10-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CA3061638A1 (en) * 2017-04-28 2018-11-01 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
US20190220485A1 (en) * 2012-10-30 2019-07-18 Elwha Llc Methods and Systems for Managing Data
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
CN112367662A (en) * 2020-12-07 2021-02-12 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100257036A1 (en) * 2009-04-02 2010-10-07 Nec Laboratories America, Inc. Method and System for Anonymity and Incentives in User-Assisted Mobile Services
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy
US20190220485A1 (en) * 2012-10-30 2019-07-18 Elwha Llc Methods and Systems for Managing Data
US20180307859A1 (en) * 2013-11-01 2018-10-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CA3061638A1 (en) * 2017-04-28 2018-11-01 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
CN112367662A (en) * 2020-12-07 2021-02-12 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
冯景瑜;杨锦雯;张瑞通;张文波;: "抗位置隐私泄露的物联网频谱共享激励机制", 《计算机研究与发展》 *
徐健: "结合区块链技术的改进K -匿名激励机制方案", 《计算机工程与应用》 *
钱萍;吴蒙;: "物联网隐私保护研究与方法综述", 计算机应用研究, no. 01 *
魏新艳;张琳;: "物联网中基于信任的频谱资源分配机制", 计算机工程, no. 04 *

Also Published As

Publication number Publication date
CN113676867B (en) 2023-11-07

Similar Documents

Publication Publication Date Title
JP2020523838A (en) System and method for addressing security-related vulnerabilities in off-blockchain channels in the event of network failure
CN111177778B (en) Mobile crowd sensing method, system, server and storage medium
CN110535833A (en) A kind of data sharing control method based on block chain
Kanza et al. Cryptotransport: blockchain-powered ride hailing while preserving privacy, pseudonymity and trust
CN109886675A (en) The distribution of resource access token based on block chain and resource use monitoring method
Puri et al. A vital role of blockchain technology toward internet of vehicles
CN113987080A (en) Block chain excitation method and device based on reputation consensus and related products
Kim et al. Ddos mitigation: Decentralized cdn using private blockchain
CN113890739B (en) Cross-blockchain authentication method and device, electronic equipment and medium
Hoque et al. Towards a threat model for vehicular fog computing
CN109697368B (en) Method, device and system for safe use of user information data and storage medium
CN103069767B (en) Consigning authentication method
CN112231721B (en) Context-aware trusted security sharing method and system for WoT resources
TWI724758B (en) Method for processing transaction via external node on blockchain and apparatus for performing the method
CN113676867B (en) Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal
CN113938477B (en) Cross-domain picture spreading access control method and system based on block chain
CN115987697A (en) Multi-level information data sharing method and system based on event subscription mechanism
CN113411407B (en) Piece-separating type car networking system based on block chain technology
Tripathy et al. Beyond Uber and Lyft: A decentralized cab consortium over blockchains
Li et al. Blockchain-Based Incentive Mechanism for Spectrum Sharing in IoV
CN111159736B (en) Application control method and system of block chain
CN111600838A (en) Authority management system based on network database
Qi et al. Location Privacy Protection of IoV based on Blockchain and K-anonymity Technology
WO2024093593A1 (en) Multi-blockchain-based data processing method and apparatus, and electronic device, computer-readable storage medium and computer program product
Tyagi et al. Ensuring trust and privacy in large carpooling problems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant