CN113676867B - Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal - Google Patents

Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal Download PDF

Info

Publication number
CN113676867B
CN113676867B CN202110647312.1A CN202110647312A CN113676867B CN 113676867 B CN113676867 B CN 113676867B CN 202110647312 A CN202110647312 A CN 202110647312A CN 113676867 B CN113676867 B CN 113676867B
Authority
CN
China
Prior art keywords
user
users
authorized
spectrum sharing
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110647312.1A
Other languages
Chinese (zh)
Other versions
CN113676867A (en
Inventor
李红宁
李荆一
裴庆祺
刘雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202110647312.1A priority Critical patent/CN113676867B/en
Publication of CN113676867A publication Critical patent/CN113676867A/en
Application granted granted Critical
Publication of CN113676867B publication Critical patent/CN113676867B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks

Abstract

The invention belongs to the technical field of Internet of vehicles spectrum sharing, and discloses an Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal, wherein the Internet of vehicles spectrum sharing excitation method comprises the following steps: the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone. The invention adopts an incentive mechanism based on position privacy protection, enhances the reliability of data through block chain distributed storage, and effectively stimulates authorized users to actively participate in spectrum sharing on the basis of preventing the position privacy of the authorized users in the Internet of vehicles from being revealed.

Description

Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal
Technical Field
The invention belongs to the technical field of Internet of vehicles spectrum sharing, and particularly relates to an Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal.
Background
At present, in the Internet of things era, the development of the Internet of vehicles is increasingly accelerated along with the deep promotion of the electric, intelligent, networking and sharing of the automobile industry in recent years. The Internet of vehicles industry is driven by the superposition of three factors of policy, funds and technology, and the coming of the 5G commercial age provides a good opportunity for the explosion of the Internet of vehicles industry. The aspect of 5G network infrastructure construction in China is in the front of the world, and the development opportunity brought to 5G by intelligent network connected automobiles and Internet of vehicles is fully considered in the next step. If the data flow between people is limited, the data flow between people and vehicles, between vehicles and between roads will be in geometric progression, the internet of vehicles communication depends on the traditional communication mode, the existing cellular communication network is utilized for data transmission, and along with the increase of the service demands of the cellular network and the application demands of massive vehicle terminals, the limited frequency spectrum resources are difficult to meet the demands of the increasingly growing internet of vehicles equipment. The department of industry radio administration deems: through fine management, the spectrum sharing of the middle and high frequency bands is realized, so that the spectrum utilization rate is improved, and the method is a good party for relieving the contradiction between the supply and demand of the spectrum. Therefore, in order to meet the situation that the mass equipment is increasingly short of spectrum resources caused by accessing the internet of vehicles, it is important to improve the utilization rate and the access efficiency of limited spectrum resources through spectrum sharing.
The excitation mechanism plays an important role in spectrum sharing, and is mainly used for the research of the spectrum sharing excitation mechanism at home and abroad, so that the excitation mechanism perceives idle spectrums of authorized users in a mutual cooperation mode, effective measures for exciting the authorized users are not considered, then, only users in a network are actively involved, the spectrum sharing can be effectively implemented in the Internet of vehicles, and the excitation mechanism is very important for the research of the excitation measures of the authorized users. In addition, the current research well protects the position privacy of the unauthorized user, but the effective attention and research are less for the incentive mechanism for supporting the position privacy protection of the authorized user, and some authorized users are reluctant to share the idle frequency spectrum due to the concern of position privacy disclosure, because the disclosure of the position privacy brings great risks to the authorized users, and an attacker can analyze the sensitive information of the specific user, such as living habits, working places, social relations and the like, according to the position track of daily behaviors.
In summary, if the location privacy of the authorized user in the internet of vehicles is not protected, the selfiness of the authorized user is further aggravated, and even the effective implementation of spectrum sharing in the internet of vehicles is severely restricted, and how to prevent the location privacy of the authorized user in the internet of vehicles from disclosure in spectrum sharing of the internet of vehicles, and on the basis, the authorized user is stimulated to actively participate in the spectrum sharing, which is a problem that needs to be solved currently.
Through the above analysis, the problems and defects existing in the prior art are as follows: the existing spectrum sharing excitation mechanism has less effective attention and study on the excitation mechanism supporting the position privacy protection of the authorized user, and the authorized user is reluctant to share the idle spectrum due to the concern of position privacy disclosure, because the disclosure of the position privacy brings great risk to the authorized user, and an attacker can analyze the sensitive information of the specific user according to the position track of daily behaviors.
The difficulty and meaning for solving the problems and the defects are as follows:
in the spectrum sharing of the internet of vehicles, an authorized user needs to submit position information in a certain range to a fusion center so as to fully utilize idle spectrum, when a cloud cover is acquired by a malicious user, the position privacy of the authorized user can be possibly revealed, if a distributed K anonymization algorithm based on a blockchain can be adopted, the accurate position information of the authorized user is fuzzily generalized to an anonymous space area, even if the malicious user breaks the cloud cover, an anonymous area consisting of K position information can only be obtained, the real position of the authorized user can not be determined, and the position privacy of the authorized user in the spectrum sharing can be protected.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention provides a method, a system, equipment, a medium and a terminal for exciting the sharing of the Internet of vehicles spectrum, in particular to a method, a system, equipment, a medium and a terminal for exciting the sharing of the Internet of vehicles spectrum based on location privacy protection, aiming at solving the problem of revealing the location privacy of authorized users in the sharing of the Internet of vehicles spectrum.
The invention is realized in such a way that the vehicle networking spectrum sharing excitation method comprises the following steps:
the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone.
Further, the internet of vehicles spectrum sharing excitation method comprises the following steps:
step one, an unauthorized user detects a free frequency spectrum of an authorized user and sends a frequency spectrum sharing request so as to utilize the free frequency spectrum of the authorized user;
step two, the authorized user receives a spectrum sharing request and triggers a position privacy protection mechanism to protect the position privacy of the authorized user;
step three, an unauthorized user participates in the K anonymous zone construction of the authorized user by monitoring an intelligent contract on a blockchain to assist in protecting the position privacy of the authorized user;
step four, the authorized user constructs a K anonymous zone, and sends the K anonymous zone and spectrum sharing permission to a spectrum management center, the spectrum management center performs spectrum allocation, and the idle spectrum of the authorized user is allocated to an unauthorized user on the premise of protecting the position privacy of the authorized user;
and fifthly, the miners distribute virtual currency for the users, rewards and punishs the users according to the behaviors of the users, stimulates authorized users to participate in spectrum sharing, unauthorized users to participate in the construction of anonymous areas, and restricts the self-utilization behaviors of the users.
Further, in the second step, the authorized user receives a spectrum sharing request, and triggers a location privacy protection mechanism, including:
the authorized user sends a position privacy protection request to the intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity of the authorized user, and if the integrity of the authorized user is less than 40, the intelligent contract refuses the position protection request; if the integrity of the authorized user is greater than 40, the intelligent contract accepts the position protection request of the authorized user, the authorized user pays deposit according to the integrity, and the number of unauthorized users and the integrity requirement required by the construction of the K anonymous zone are submitted.
Further, in the third step, the unauthorized user participates in the K anonymous zone construction of the authorized user by monitoring the intelligent contract on the blockchain, and the method comprises the following steps:
an unauthorized user selects whether to participate in the K anonymous zone construction of an authorized user by monitoring the intelligent contracts on the blockchain, the unauthorized user willingly participating in the K anonymous zone construction submits a request to the intelligent contracts and can be added into a willingness list by the intelligent contracts, and if the unauthorized user submitting the request meets the requirements of integrity, the intelligent joining date adds the unauthorized user into an anonymous group;
if the unauthorized users in the anonymous group meet the requirements of the authorized users, the anonymous group is successfully constructed, and all the unauthorized users in the anonymous group send the position information to the authorized users; if there are not enough unauthorized users in the anonymous group, the intelligent mergence date sends the wishlist to the authorized user, and the authorized user resubmisses the number and the integrity requirements of the unauthorized users needed by the K anonymous zone construction, and the anonymous group is reconstructed.
In a fifth step, the miner allocates virtual currency to the user, and rewards and punishs the user according to the behavior of the user, including:
if no illegal action occurs to the user in the anonymous zone structure, returning deposit paid by the user and increasing the integrity H of the user to the following level:and distributing money to the user according to the rules;
if the user has illegal behaviors, the method comprises the following steps:
1) If the user PU is authorized 0 Authenticating an unauthorized user SU 1 Providing false location information to violate the user SU 1 The ID and violation information are broadcast in the blockchain, and the receiving user SU 1 Deposit for paymentThe integrity of the offending user>And (3) reducing to:
2) If the user SU is not authorized 1 Authenticating an authorized user PU 0 Offending behavior occurs, and offending user PU is to be offended 0 The ID and violation information of (1) are broadcast in the blockchain, and deposit paid by the violation user is not receivedAnd the integrity of the offending user is +.>And (3) reducing to:if the user PU is authorized 0 Identifying that there are unauthorized users providing false location information in a certain anonymous zone configuration, but not determining which of the unauthorized users provides false location information, and then collecting all of the unauthorized users SU in the transaction bill i (i=1, 2,3,., K) deposit paid ∈1>And will->And (3) reducing to: />
Further, the distributing money to the users according to the rules includes:
setting the virtual currency generated by the mining at this time as V, the number of unauthorized users participating in the anonymous zone structure as K, and if the unauthorized users do not find illegal behaviors on the fifth block and the blocks after the fifth block, obtaining the virtual currency as KIf there is a record of its offensiveness on the fifth block and blocks following it, then the virtual currency it gets is +>For each unauthorized user, if no illegal activity is found in the fifth block and blocks after the fifth block, the obtained virtual currency is +.>If there is a record of its offensiveness on the fifth block and blocks following it, then the virtual currency it gets is +>
The invention further aims to provide a vehicle networking spectrum sharing excitation system applying the vehicle networking spectrum sharing excitation method, which comprises a cloud layer, an edge layer and a user layer.
In the cloud layer, a fusion center uses a data fusion algorithm to combine the perception data from all edge layers to obtain a final perception decision about the available spectrum of an authorized user, and stores various data generated in spectrum sharing activities, including the ID of the user participating in the spectrum sharing, the position information thereof and the like, in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is perceived, and the idle spectrum resource is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, the authorized users contribute idle spectrum resources under the service requirement and application environment of the Internet of vehicles, and the unauthorized users expect to obtain opportunities of spectrum sharing.
It is a further object of the present invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone.
Another object of the present invention is to provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone.
The invention further aims to provide an information data processing terminal which is used for realizing the vehicle networking spectrum sharing excitation system.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the method for exciting the spectrum sharing of the internet of vehicles, provided by the invention, the position privacy of authorized users in the spectrum sharing of the internet of vehicles is protected by using a K-anonymity algorithm based on a blockchain, and miners record the IDs and position information of the authorized users and the unauthorized users in the blockchain as evidence so as to restrict the self-utilization behaviors of the authorized users and the unauthorized users in the construction process of an anonymity zone; based on a designed position privacy protection scheme, combining a blockchain technology, issuing virtual currency in the blockchain as an incentive to users, wherein the incentive authorized users actively participate in spectrum sharing, and unauthorized users provide real positions to participate in the construction of an anonymous zone; the user's self-utilization behavior is restrained by paying deposit, introducing the loyalty evaluation mechanism and reducing the income in n rounds of illegal users, the loyalty decides deposit that the user needs to pay, the authorized user and the unauthorized user perform bidirectional selection according to the loyalty when constructing an anonymous zone, and when the loyalty of the authorized user is lower than 40, the user's position privacy protection requirement is refused. In addition, in order to solve the problem that the unauthorized users have too high requirements on the integrity of the unauthorized users or too large requirements on the number of the unauthorized users participating in constructing an anonymous zone, and do not participate in the construction of the anonymous zone enough to cause failure of position privacy protection, a willingness list is introduced, and after the construction of the anonymous zone fails, the authorized users can readjust the requirements according to the willingness list.
The invention adopts the excitation mechanism based on the position privacy protection, and can effectively excite the authorized user to actively participate in the spectrum sharing on the basis of preventing the position privacy of the authorized user in the Internet of vehicles from being revealed. Meanwhile, the location privacy protection technology used in the invention is based on the blockchain, the blockchain distributed storage can enhance the reliability of data, the storage has the characteristic of deduplication, the more users are, the lower the cost is, the leakage of the location of the unauthorized user by the authorized user in the construction process of the distributed anonymous zone is prevented, and the false location deception authorized user is provided by the unauthorized user.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an excitation method for sharing spectrum of internet of vehicles provided by an embodiment of the invention.
Fig. 2 is a schematic diagram of an excitation method for sharing spectrum of internet of vehicles according to an embodiment of the present invention.
Fig. 3 is a block diagram of an excitation system for sharing spectrum of internet of vehicles, which is provided by the embodiment of the invention.
Fig. 4 is a schematic view of an application scenario provided in an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Aiming at the problems existing in the prior art, the invention provides a method, a system, equipment, a medium and a terminal for exciting the spectrum sharing of the Internet of vehicles, and the invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the method for exciting spectrum sharing of internet of vehicles provided by the embodiment of the invention comprises the following steps:
s101, an unauthorized user detects a free frequency spectrum of an authorized user and sends a frequency spectrum sharing request so as to utilize the free frequency spectrum of the authorized user;
s102, an authorized user receives a spectrum sharing request, and a position privacy protection mechanism is triggered to protect position privacy of the authorized user;
s103, the unauthorized user participates in the K anonymous zone construction of the authorized user by monitoring the intelligent contract on the blockchain to assist in protecting the position privacy of the authorized user;
s104, the authorized user constructs a K anonymous zone, and sends the K anonymous zone and spectrum sharing permission to a spectrum management center, the spectrum management center performs spectrum allocation, and the idle spectrum of the authorized user is allocated to an unauthorized user on the premise of protecting the position privacy of the authorized user;
s105, miners distribute virtual currency for users, rewards and punishs the users according to the behaviors of the users, stimulates authorized users to participate in spectrum sharing, unauthorized users to participate in construction of anonymous areas, and restricts self-utilization behaviors of the users.
The schematic diagram of the method for exciting the spectrum sharing of the Internet of vehicles provided by the embodiment of the invention is shown in figure 2.
As shown in fig. 3, the spectrum sharing excitation system for the internet of vehicles provided by the embodiment of the invention comprises a cloud layer, an edge layer and a user layer.
In the cloud layer, a fusion center uses a data fusion algorithm to combine the perception data from all edge layers to obtain a final perception decision about the available spectrum of an authorized user, and stores various data generated in spectrum sharing activities, including the ID of the user participating in the spectrum sharing, the position information thereof and the like, in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is perceived, and the idle spectrum resource is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, the authorized users contribute idle spectrum resources under the service requirement and application environment of the Internet of vehicles, and the unauthorized users expect to obtain opportunities of spectrum sharing.
The technical scheme of the invention is further described below by combining the embodiments.
The invention provides a vehicle networking spectrum sharing excitation mechanism based on location privacy protection, which utilizes a K-anonymity algorithm based on a blockchain to protect the location privacy of authorized users in the vehicle networking spectrum sharing, and miners record the IDs and location information of the authorized users and the unauthorized users in the blockchain as evidence so as to restrict the self-utilization behaviors of the authorized users and the unauthorized users in the anonymity zone construction process; based on a designed position privacy protection scheme, combining a blockchain technology, issuing virtual currency in the blockchain as an incentive to users, wherein the incentive authorized users actively participate in spectrum sharing, and unauthorized users provide real positions to participate in the construction of an anonymous zone; the user's self-utilization behavior is restrained by paying deposit, introducing the loyalty evaluation mechanism and reducing the income in n rounds of illegal users, the loyalty decides deposit that the user needs to pay, the authorized user and the unauthorized user perform bidirectional selection according to the loyalty when constructing an anonymous zone, and when the loyalty of the authorized user is lower than 40, the user's position privacy protection requirement is refused. In addition, in order to solve the problem that the unauthorized users have too high requirements on the integrity of the unauthorized users or too large requirements on the number of the unauthorized users participating in constructing an anonymous zone, and do not participate in the construction of the anonymous zone enough to cause failure of position privacy protection, a willingness list is introduced, and after the construction of the anonymous zone fails, the authorized users can readjust the requirements according to the willingness list.
In order to achieve the above object, the present invention comprises the following specific steps:
step one, an unauthorized user plays a role of an edge server, perceives the spectrum use condition of an authorized user, detects a free spectrum of the authorized user, sends a spectrum sharing request, and accesses the free spectrum resource of the authorized user on the premise of not interfering the authorized user;
and step two, assuming that secure communication links exist between users and between the users and the fusion center, and the authorized users and the unauthorized users can send and receive messages to the blockchain intelligent contract, each user has a public and private key pair, so that the content sent by the user can be signed, and the uniqueness and non-repudiation of the transaction content are ensured. In the service requirement and application environment of the Internet of vehicles, the authorized user receives the spectrum protection request of the unauthorized user, and selects to accept or reject spectrum sharing. When authorized users agree to share the idle spectrum, a blockchain-based location privacy protection model is triggered to protect the location privacy of the authorized users, and a location protection requirement is sent to an intelligent contract to acquire the real location of the unauthorized users to construct an anonymous zone, wherein the method comprises the following specific steps:
the method comprises the steps that an authorized user sends a position privacy protection request to an intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity of the authorized user, when the integrity of the authorized user is greater than 40, the intelligent contract accepts the position protection request of the authorized user, the authorized user pays deposit according to the integrity of the authorized user, and the number and integrity requirements of unauthorized users required for constructing a K anonymous zone are submitted.
Step three, an unauthorized user checks when someone seeks anonymous assistance by monitoring an intelligent contract on a blockchain network, selects whether to participate in an anonymous zone structure according to the integrity of the authorized user, if the unauthorized user has a wish to participate in the anonymous zone structure, sends a request to the intelligent contract, if the unauthorized user meets the requirement of the authorized user, joins an anonymous group, and sends position information to the authorized user so as to construct the anonymous zone, wherein the specific steps are as follows:
the unauthorized user selects whether to participate in the anonymous zone construction of the authorized user or not through monitoring the intelligent contract on the blockchain, the unauthorized user with willingness to participate in the anonymous zone construction is added into the willingness list by the intelligent contract, so that the requirements of integrity are met, and the unauthorized user with willingness to participate in the anonymous zone construction and the authorized user form an anonymous group. If the unauthorized user in the anonymous group does not meet the requirement of the authorized user, the wishlist is sent to the authorized user, the authorized user resubmisses the number and the integrity requirement of the unauthorized user required by the anonymous zone construction, if the authorized user in the anonymous group meets the requirement of the unauthorized user, the anonymous group construction is successful, and the unauthorized user in the anonymous group sends the position information to the authorized user.
Step four, after receiving the position information of the unauthorized user, the authorized user constructs an anonymous zone, and sends the anonymous zone and the spectrum sharing license to a spectrum management center, and the spectrum management center performs spectrum allocation;
and fifthly, the miners distribute virtual currency for the users, and rewards and punishs the users according to the behaviors of the users. The method specifically comprises the following steps:
1) Setting the virtual currency generated by the mining at this time as V, the number of unauthorized users participating in the anonymous zone structure as K, and if the unauthorized users do not find illegal behaviors on the fifth block and the blocks after the fifth block, obtaining the virtual currency as KIf there is a record of its offensiveness on the fifth block and blocks following it, then the virtual currency it gets is +>
2) For each unauthorized user, if no illegal action is found in the fifth block and blocks after the fifth block, the obtained virtual currency isIf there is a record of its offensiveness on the fifth block and blocks following it, then the virtual currency it gets is +>
As shown in fig. 3, a system structure diagram of spectrum sharing of internet of vehicles provided by the embodiment of the invention includes a cloud layer, an edge layer and a user layer. In the cloud layer, a fusion center uses a data fusion algorithm to combine the perceived data from all edge layers to obtain a final perceived decision about the spectrum available to the authorized user, and stores various data generated in the spectrum sharing activity, including the IDs of users participating in the spectrum sharing and their location information, etc. in the cloud. In the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is perceived, and the idle spectrum resource is accessed on the premise of not interfering the authorized user. The user layer is mainly composed of authorized users and unauthorized users, the authorized users contribute idle spectrum resources under the service requirement and application environment of the Internet of vehicles, and the unauthorized users expect to obtain opportunities of spectrum sharing.
As shown in fig. 4, the application scenario of the invention is spectrum sharing in the internet of vehicles, and is composed of unauthorized users, authorized users and a fusion center, without a third party, and the authorized users and the unauthorized users can send and receive messages to a blockchain intelligent contract, and each user has a public and private key pair, so that the content sent by the user can be signed, and the uniqueness and non-repudiation of the transaction content are ensured. In the Internet of vehicles, an unauthorized user perceives a free frequency spectrum of an authorized user, sends a frequency spectrum sharing request, the authorized user selects to accept or reject the frequency spectrum sharing, when the authorized user agrees to share the free frequency spectrum, a position privacy protection model based on a blockchain is triggered, a position protection requirement is sent to an intelligent contract to acquire the real position of the unauthorized user, an anonymous zone is constructed, and the anonymous zone is submitted to a fusion center together with a frequency spectrum sharing license, and the fusion center distributes the frequency spectrum for the unauthorized user.
The technical effects of the present invention are further described below in connection with simulation experiments.
1. Experimental conditions
In the spectrum sharing scene of the Internet of vehicles, the simulation running system is an Intel (R) Core (TM) i7-10700@2.90GHz,64 bit Windows operating system, the platform is divided into two parts of distributed anonymous zone cooperation construction block chain construction and data processing, the platform of the distributed anonymous zone cooperation construction block chain is Ethereum1.5.5 version, and the data processing adopts python3.8.
2. Experimental results and analysis
In the spectrum sharing of the internet of vehicles, the existing research omits an incentive mechanism of an authorized user, but is very important to the research of the incentive mechanism of the authorized user. The excitation mechanism based on the position privacy protection adopts the process of constructing an anonymous zone by using the blockchain storage and the position information of the user, does not need a third party mechanism, and can store transaction data in a distributed mode, so that the problems of insufficient computing resources and the like in a centralized mode can be effectively solved, when part of public chain nodes encounter distributed denial of service attack, all transaction records can still be normally operated and stored in other public blockchain nodes, and the system breakdown of the whole excitation mechanism is avoided; secondly, the invention adopts K anonymity technology, confuses the one-to-one correspondence of identity information and position information, protects the position privacy of authorized users in spectrum sharing, and each user on the public blockchain only takes a string of digital accounts as agents, and K anonymity groups are constructed by a pseudonymous mechanism initially, thus greatly improving the security. The excitation model only hides the corresponding relation between the identity information and the position information, but retains the accurate position data, fully considers the honesty of the user when selecting the K anonymous group members, collects the deposit to restrict the self-utilization of the user to a certain extent, improves the success rate of forming the K anonymous group, and not only protects the position privacy of the user, but also provides higher service quality. In addition, because the motivation mechanism is realized based on the blockchain system, the blockchain system has the pseudonyms used by the users, the connection between the user names and the true identities of the user names is cut off, and the true identities of the communication nodes can not be obtained by both communication parties or a third party, so that the malicious nodes are prevented from obtaining the true identities of the users; and the information stored by the blockchain is difficult to tamper, once the privacy behaviors of authorized users and unauthorized users in the anonymous zone construction process are discovered, dishonest users can be punished according to the information stored by the blockchain as evidence. Finally, the excitation mechanism of the blockchain enables authorized users in the network to participate in spectrum sharing actively, unauthorized users participate in anonymous group construction actively, and the anonymous group generation efficiency is improved while the privacy of the users is protected.
When the authorized user adopts the method for protecting the position privacy, the average calculation time delay required by successfully constructing the anonymous zone is in an increasing trend along with the increasing of the privacy protection requirement K. While for unauthorized users the average computation delay required is independent of the privacy protection requirement K value for authorized users. The reason for the above phenomenon is that with the increasing of the K value, the number of times that the authorized user needs to verify the correctness of the signature data sent by the unauthorized user and decrypt and acquire the actual position of the cooperative user increases. However, for an unauthorized user, after the unauthorized user constructs a request by monitoring an intelligent contract on the blockchain network, the unauthorized user only needs to send a ciphertext for encrypting the true position of the unauthorized user by using the public key of the requesting user and signature data corresponding to the ciphertext to the authorized user, so that the average calculation delay required by the unauthorized user is irrelevant to the K value. Furthermore, in the anonymous zone construction process, the average communication overhead required by the authorized user increases as the authorized user privacy protection requirement K value increases. The reason for this is that as the K value becomes larger, the authorized user needs to receive more location information provided by unauthorized users to construct an anonymous zone, thereby increasing the average communication overhead of the authorized user. However, for unauthorized users, since the point-to-point communication is adopted to provide the authorized users with their own real locations, the average communication overhead required by the unauthorized users does not change with the change of the K value of the privacy protection requirement of the authorized users. Under the condition that the number of users in the network is fixed, the anonymizing processing time is increased along with the increase of the K value of the anonymizing area, and the more the number of times of recursion inquiry is needed, the more the time is spent, but the position privacy of authorized users can be better protected. In addition, under the condition that the K value is fixed, the number of users in the network is inversely proportional to the time of the anonymous zone construction, the more the users in the network are, the less the time is spent, and when the number of the users in the network is insufficient, the anonymous zone construction can be failed; and in the limited time, the larger the k value required by the authorized user is, the higher the number of users in the network is required.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When used in whole or in part, is implemented in the form of a computer program product comprising one or more computer instructions. When loaded or executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the invention is not limited thereto, but any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention will be apparent to those skilled in the art within the scope of the present invention.

Claims (9)

1. The method for exciting the spectrum sharing of the internet of vehicles is characterized by comprising the following steps of: the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; constraining user behaviors by paying deposit and introducing an integrity evaluation mechanism, and introducing an intention list to ensure the construction of a K anonymous zone, and stimulating authorized users to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized users in the spectrum sharing of the Internet of vehicles;
the method for exciting the spectrum sharing of the Internet of vehicles comprises the following steps of:
step one, an unauthorized user detects a free frequency spectrum of an authorized user and sends a frequency spectrum sharing request;
step two, authorizing the user to accept the spectrum sharing request, triggering a position privacy protection mechanism;
step three, an unauthorized user participates in the K anonymous zone construction of an authorized user by monitoring an intelligent contract on a blockchain;
step four, the authorized user constructs a K anonymous zone, and sends the K anonymous zone and spectrum sharing permission to a spectrum management center, and the spectrum management center performs spectrum allocation;
and fifthly, the miners distribute virtual currency for the users, and rewards and punishs the users according to the behaviors of the users.
2. The method for exciting spectrum sharing of internet of vehicles according to claim 1, wherein in the second step, the authorized user accepts the spectrum sharing request and triggers a location privacy protection mechanism, comprising:
the authorized user sends a position privacy protection request to the intelligent contract, the intelligent contract judges whether to accept the position protection request of the authorized user according to the integrity of the authorized user, and if the integrity of the authorized user is less than 40, the intelligent contract refuses the position protection request; if the integrity of the authorized user is greater than 40, the intelligent contract accepts the position protection request of the authorized user, the authorized user pays deposit according to the integrity, and the number of unauthorized users and the integrity requirement required by the construction of the K anonymous zone are submitted.
3. The method for spectrum sharing excitation of internet of vehicles according to claim 1, wherein in the third step, the unauthorized user participates in K anonymous zone construction of the authorized user by monitoring an intelligent contract on a blockchain, comprising:
an unauthorized user selects whether to participate in the K anonymous zone construction of an authorized user by monitoring the intelligent contracts on the blockchain, the unauthorized user willingly participating in the K anonymous zone construction submits a request to the intelligent contracts and can be added into a willingness list by the intelligent contracts, and if the unauthorized user submitting the request meets the requirements of integrity, the intelligent joining date adds the unauthorized user into an anonymous group;
if the unauthorized users in the anonymous group meet the requirements of the authorized users, the anonymous group is successfully constructed, and all the unauthorized users in the anonymous group send the position information to the authorized users; if there are not enough unauthorized users in the anonymous group, the intelligent mergence date sends the wishlist to the authorized user, and the authorized user resubmisses the number and the integrity requirements of the unauthorized users needed by the K anonymous zone construction, and the anonymous group is reconstructed.
4. The method for spectrum sharing excitation of internet of vehicles according to claim 1, wherein in the fifth step, the miners assign virtual currency to the users, and perform rewards and punishments on the users according to the behaviors of the users, comprising:
if no illegal action occurs to the user in the anonymous zone structure, returning deposit paid by the user and increasing the integrity H of the user to the following level:and distributing money to the user according to the rules;
if the user has illegal behaviors, the method comprises the following steps:
1) If the user PU is authorized 0 Authenticating an unauthorized user SU 1 Providing false location information to violate the user SU 1 The ID and violation information are broadcast in the blockchain, and the receiving user SU 1 Deposit for paymentThe integrity of the offending user>And (3) reducing to:
2) If the user SU is not authorized 1 Authenticating an authorized user PU 0 Offending behavior occurs, and offending user PU is to be offended 0 The ID and violation information of (1) are broadcast in the blockchain, and deposit paid by the violation user is not receivedAnd the integrity of the offending user is +.>And (3) reducing to:if the user PU is authorized 0 Identifying that there are unauthorized users providing false location information in a certain anonymous zone configuration, but not determining which of the unauthorized users provides false location information, and then collecting all of the unauthorized users SU in the transaction bill i (i=1, 2,3,., K) deposit paid ∈1>And will->And (3) reducing to: />
5. The internet of vehicles spectrum sharing incentive method of claim 4, wherein said assigning money to users according to rules comprises:
let this virtual currency be V, the number of unauthorized users participating in the anonymous zone structure be K, for authorized users, if no illegal activity is found in the fifth block and blocks thereafter, the obtained virtual currency isIf there is a record of its offensiveness on the fifth block and blocks following it, the virtual currency obtained isFor each unauthorized user, if no illegal activity is found in the fifth block and blocks after the fifth block, the obtained virtual currency is +.>If there is a record of its offensiveness on the fifth block and blocks following it, then the virtual currency it gets is +>
6. A vehicle networking spectrum sharing excitation system for implementing the vehicle networking spectrum sharing excitation method according to any one of claims 1-5, characterized in that the vehicle networking spectrum sharing excitation system comprises a cloud layer, an edge layer and a user layer;
in the cloud layer, a fusion center uses a data fusion algorithm to combine the perception data from all edge layers to obtain a final perception decision about the available spectrum of an authorized user, and stores various data generated in spectrum sharing activities, including the ID of the user participating in the spectrum sharing, the position information thereof and the like, in the cloud;
in the edge layer, the role of the edge server is played by an unauthorized user, the spectrum use condition of the authorized user is perceived, and the idle spectrum resource is accessed on the premise of not interfering the authorized user;
the user layer is composed of authorized users and unauthorized users, the authorized users contribute idle spectrum resources under the service requirement and application environment of the Internet of vehicles, and the unauthorized users expect to obtain opportunities of spectrum sharing.
7. A computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone.
8. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
the method comprises the steps of adopting a K anonymity algorithm based on a blockchain to protect the position privacy of authorized users in the spectrum sharing of the Internet of vehicles, recording the IDs and position information of the authorized users and unauthorized users in the blockchain as evidence, and issuing virtual currency in the blockchain as incentive; the authorized user is stimulated to actively participate in spectrum sharing on the basis of protecting the position privacy of the authorized user in the spectrum sharing of the Internet of vehicles by paying deposit, introducing an integrity evaluation mechanism and the like to restrict user behaviors and introducing an intention list to ensure the construction of a K anonymous zone.
9. An information data processing terminal, characterized in that the information data processing terminal is configured to implement the internet of vehicles spectrum sharing incentive system according to claim 6.
CN202110647312.1A 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal Active CN113676867B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110647312.1A CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110647312.1A CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Publications (2)

Publication Number Publication Date
CN113676867A CN113676867A (en) 2021-11-19
CN113676867B true CN113676867B (en) 2023-11-07

Family

ID=78538164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110647312.1A Active CN113676867B (en) 2021-06-10 2021-06-10 Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal

Country Status (1)

Country Link
CN (1) CN113676867B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
CA3061638A1 (en) * 2017-04-28 2018-11-01 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
CN112367662A (en) * 2020-12-07 2021-02-12 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100257036A1 (en) * 2009-04-02 2010-10-07 Nec Laboratories America, Inc. Method and System for Anonymity and Incentives in User-Assisted Mobile Services
US9043927B2 (en) * 2012-09-27 2015-05-26 Neo Mechanic Limited Method and apparatus for authenticating location-based services without compromising location privacy
US20190220485A1 (en) * 2012-10-30 2019-07-18 Elwha Llc Methods and Systems for Managing Data
US10572684B2 (en) * 2013-11-01 2020-02-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3061638A1 (en) * 2017-04-28 2018-11-01 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
CN112367662A (en) * 2020-12-07 2021-02-12 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
冯景瑜 ; 杨锦雯 ; 张瑞通 ; 张文波 ; .抗位置隐私泄露的物联网频谱共享激励机制.《计算机研究与发展》.2020,参见期刊全文. *
物联网中基于信任的频谱资源分配机制;魏新艳;张琳;;计算机工程(04);全文 *
物联网隐私保护研究与方法综述;钱萍;吴蒙;;计算机应用研究(01);全文 *
结合区块链技术的改进K -匿名激励机制方案;徐健;《计算机工程与应用》;参见期刊全文 *

Also Published As

Publication number Publication date
CN113676867A (en) 2021-11-19

Similar Documents

Publication Publication Date Title
CN111767530B (en) Cross-domain data sharing audit tracing system, method, storage medium and program
US20170201516A1 (en) Terminal Identification Method, and Method, System and Apparatus of Registering Machine Identification Code
CN110851496A (en) Method, apparatus, accounting node and medium for querying transaction information in blockchain network
Symeonidis et al. Keyless car sharing system: A security and privacy analysis
CN109886675A (en) The distribution of resource access token based on block chain and resource use monitoring method
CN110569643A (en) traffic management method and device based on block chain network
CN116708037B (en) Cloud platform access right control method and system
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN113987080A (en) Block chain excitation method and device based on reputation consensus and related products
Puri et al. A vital role of blockchain technology toward internet of vehicles
CN114357490A (en) Data sharing method, device and system based on block chain
Kwame et al. V-chain: A blockchain-based car lease platform
Chai et al. BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things
CN103069767B (en) Consigning authentication method
CN109697368B (en) Method, device and system for safe use of user information data and storage medium
CN112231721B (en) Context-aware trusted security sharing method and system for WoT resources
CN102972005B (en) Pay authentication method
CN113676867B (en) Internet of vehicles spectrum sharing excitation method, system, equipment, medium and terminal
TWI724758B (en) Method for processing transaction via external node on blockchain and apparatus for performing the method
CN113938477B (en) Cross-domain picture spreading access control method and system based on block chain
CN115987697A (en) Multi-level information data sharing method and system based on event subscription mechanism
Yu et al. Research on zero trust access control model and formalization based on rail transit data platform
Tripathy et al. Beyond Uber and Lyft: A decentralized cab consortium over blockchains
CN114626934A (en) Block chain-based multi-level wind control system and control method
Li et al. Blockchain-Based Incentive Mechanism for Spectrum Sharing in IoV

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant