CN113949989B - Position service query method and system based on privacy protection in road network environment - Google Patents
Position service query method and system based on privacy protection in road network environment Download PDFInfo
- Publication number
- CN113949989B CN113949989B CN202111199024.0A CN202111199024A CN113949989B CN 113949989 B CN113949989 B CN 113949989B CN 202111199024 A CN202111199024 A CN 202111199024A CN 113949989 B CN113949989 B CN 113949989B
- Authority
- CN
- China
- Prior art keywords
- lsp
- location
- user
- service provider
- query
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention discloses a location-based service query method and a system for privacy protection in a road network environment, wherein the method comprises the following steps: the registration of the user and the location-based service provider is realized through a trusted center, wherein the trusted center generates system parameters according to the Chinese remainder theorem; providing a location-based service query including road conditions of potential routes and optimal routes to the user according to an unintentional transmission method by the location-based service provider; communication between subscribers and location-based service providers is via roadside units, where wireless communication between roadside units and subscribers is accomplished by the IEEE802.11p standard and communication between roadside units and location-based service providers is accomplished by wired links or low latency high bandwidth wireless links. The invention can protect the query content and the position privacy of the user, and has smaller calculation cost and communication cost, thereby being more suitable for the position service-based query in the road network environment.
Description
Technical Field
The invention relates to the technical field of location-based services, in particular to a location-based service query method and system based on privacy protection in a road network environment.
Background
In a road network environment, a user wants to obtain Location-Based services (LBS), and typically needs to send Location information and query reports to a Location-Based Service provider (LSP) using a wireless communication technology. Typical LBS include: point-of-interest search, route navigation, location-based recommendation services, and the like. However, there is a risk of leakage of the query content and the location information of the user in LBS, for example, the LSP reveals the location privacy and the query content of the user to a malicious adversary due to a benefit relationship. Location privacy disclosure can seriously threaten user property and personal safety, for example, users can infer that the user may have health problems by frequently inquiring road conditions near a hospital; users often use location-based query services during off-hours, and can infer their likely home addresses.
Location privacy preserving LBS have received a lot of attention, and privacy preserving technologies in existing location services mainly include k-anonymization technology, false identity technology, location perturbation technology, homomorphic encryption technology, and careless transmission technology, where:
(1) The basic idea of the k-anonymity technique is that the user sends his own real location and query content to a trusted anonymity server, which generates an anonymity query report for him containing the other k-1 user locations and sends it to the LSP. At this time, the accuracy of LSP-associated users and query reports does not exceed 1/k. However, if the query generated by the anonymizing server is too large, the query overhead of the LSP may be increased.
(2) The main idea of false identity technology is that a false user identity is used for replacing a real user identity when a user sends a request report so as to achieve the purpose of confusing the corresponding relationship between the user identity and the position. However, in the case of low area traffic, an attacker can eavesdrop on the query report and successfully track the target user.
(3) The main idea of random disturbance of location is that the user uses false or disturbed locations instead of his own real locations and adds to the service request. However, a disadvantage of this technique is that the large number of false locations increases the computational overhead of the location-based server and the latency of the query service request.
(4) The main idea of homomorphic encryption technology is to protect the location privacy of a user by operation on ciphertext. However, this technique requires high computational overhead and does not support a scene where the user density is high.
(5) The inadvertent transmission technique protects the user's location privacy by hiding the interrogation location, but the computational overhead and communication costs of this technique are proportional to the data dimension.
In summary, the current privacy protection based location service framework is designed mainly by using k-anonymity, false identity, location disturbance, homomorphic encryption and careless transmission technology, and the privacy of the user location in the k-anonymity based location service framework is easy to eavesdrop; the large number of false locations in the location-based stochastic perturbation framework increases the location-server based computational overhead and the latency of query service requests; scenes with high computation overhead and high user density are not supported in a homomorphic encryption-based framework; the computational and communication overhead in the framework based on the unintentional is proportional to the data dimension.
Disclosure of Invention
In order to solve the problems, the invention provides a position service-based query method and a position service-based query system for privacy protection in a road network environment based on an careless transmission technology and China remainder theorem, which can protect query content and position privacy of users, and have smaller calculation cost and communication cost, so that the method and the system are more suitable for position service-based query in the road network environment.
The technical scheme adopted by the invention is as follows:
a method for inquiring privacy protection based on location service in a road network environment comprises the following steps:
the user U and the LSP are registered through a trusted center TA, wherein the trusted center TA generates system parameters according to the Chinese remainder theorem;
providing a location-based service query to a user U according to an unintentional transmission method by a location-based service provider LSP, wherein the content of the location-based service query comprises a road condition of a potential route and an optimal route;
communication between the subscriber U and the location-based service provider LSP is performed by a roadside unit RSU, wherein wireless communication between the roadside unit RSU and the subscriber U is implemented by an IEEE802.11p standard, and communication between the roadside unit RSU and the location-based service provider LSP is implemented by a wired link or a low-latency high-bandwidth wireless link.
Further, the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curve E:y 2 =x 3 Finite field F formed by points (x, y) of +ax+bmod p p Wherein a, b E F p ,4a 3 +27b 2 Not equal to 0, p is a large prime number; all points (x, y) on E and infinite point O form an additive groupThe generating element is P, and the order is prime number q;
s102, randomly selecting a system master keyWherein->Representing a set of positive integers and computing a system public key P pub =sP;
S104, selecting prime number { q } 1 ,q 2 ,…,q n -and calculate:
the road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k Denoted, where k=1, 2, …, n, for the designation { u } k ,v k Road section allocation alpha k Where k ε {1, …, n };
Further, the registering of the user U through the trusted center TA includes: the user U generates the private key sk by the following steps u Public key PK u :
S201, setting a secret value: user U randomly selects secret valuesCalculating a disclosure value X u =x u P, and send the secret value X u And identity information ID u Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret value X u And identity information ID u Thereafter, the trusted center TA randomly selectsCalculating part of public key R u =r u P and blinded partial private key g u =r u +H 0 (s·X u )+s·H 1 (ID u ,R u ,X u ,P pub ) And return R u And g u Giving the user U;
s203, setting a private key: the user U first calculates a partial private key d u =g u -H 0 (x u ·P pub ) Then verify d u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub Whether or not to establish; if so, the user U sets a private key sk u ={x u ,d u -a }; otherwise, terminate;
s204, setting a public key: user U sets public key PK u ={X u ,R u }。
Further, the enabling of the registration based on the location service provider LSP by the trusted center TA comprises: generating a private key sk based on a location service provider LSP by lsp Public keyPK lsp ;
S301, setting a secret value: random selection of secret values based on location service provider LSPsCalculating a disclosure value X lsp =x lsp P, and send the public value X lsp And identity information ID lsp Giving the trusted center TA;
s302, extracting part of private keys: the trusted center TA receives the public value X lsp And identity information ID lsp After that, randomly selectCalculating part of public key R lsp =r lsp P and blinded partial private key g lsp =r lsp +H 0 (s·X lsp )+s·H 1 (ID lsp ,R lsp ,X lsp ,P pub ) And return R lsp And g lsp Giving a location-based service provider LSP;
s303, setting a private key: partial private key d is first calculated based on a location service provider LSP u =g lsp -H 0 (x lsp ·P pub ) Then verify d lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub Whether or not to establish; if so, setting a private key sk based on the location service provider LSP lsp ={x lsp ,d lsp -a }; otherwise, terminate;
s304, setting a public key: setting public key PK based on location service provider LSP lsp ={X lsp ,R lsp }。
Further, assume that the road segment identity { u } is to be queried k ,v k Road conditions, user U generates a query report by:
A u =a u P,B u =b u P,M u =u u +x u A u ,N u =v u +x u B u ,L u =l u P,
σ u =d u +x u H 2 (ID u ,X u ,R u )+l u H 3 (ID u ,A u ,B u ,M u ,N u ,L u );
s402, a user U sends a query report { A } u ,B u ,M u ,N u ,L u ,σ u And to the location-based service provider LSP.
Further, query report { A } is received based on the location service provider LSP u ,B u ,M u ,N u ,L u ,σ u After } a reply report is generated by:
s501. verifying whether the following equation holds based on the location service provider LSP:
σ u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub +H 2 (ID u ,X u ,R u )X u +H 3 (ID u ,A u ,B u ,M u ,N u ,L u )L u
if true, accept query report { A u ,B u ,M u ,N u ,L u ,σ u -a }; otherwise, refusing;
L lsp =l lsp P,σ lsp =d lsp +x lsp H 2 (ID lsp ,X lsp ,R lsp )+l lsp H 3 (ID lsp ,Θ lsp ,Φ lsp ,Δ lsp ,L lsp );
s503, sending a reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp And to user U.
Further, user U receives a reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp After } the identity { u } is obtained by the following steps k ,v k Road condition data m of road section of } being k :
S601, the user U verifies whether the following equation is satisfied
σ lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub +H 2 (ID lsp ,X lsp ,R lsp )X lsp +H 3 (ID lsp ,Θ lsp ,Φ lsp ,Δ lsp ,L lsp )L lsp
If so, the user U accepts the reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp -a }; otherwise, refusing;
s602, a user U reads road condition data m k =Δ lsp modα k -H 4 (Φ lsp -x u Θ lsp )。
A location-based service query system for privacy protection in a road network environment, comprising:
a location-based service provider, LSP, for providing a location-based service query to a user U according to an unintentional transmission method, the content of the location-based service query comprising road conditions of potential routes and optimal routes;
the trusted center TA is used for generating system parameters according to the Chinese remainder theorem, namely the Chinese remainder theorem, realizing the registration of the user U and the LSP based on the location service provider and updating the system information periodically;
and the roadside unit RSU is used for completing communication between the user U and the LSP based on the location service provider, wherein the wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and the communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link.
The invention has the beneficial effects that:
existing privacy-preserving location-based service frameworks are designed primarily with k-anonymity, false identity, location perturbation, homomorphic encryption, and careless transmission techniques. However, the existing solutions are either relatively poor in performance (high computational overhead and communication bandwidth), or cannot meet the security requirements (query content and location privacy protection) in the road network environment. The position service-based query method and system for privacy protection in the road network environment can protect the query content and position privacy of the user, and simultaneously has smaller calculation cost and communication cost, so that the method and system are more suitable for position service-based query in the road network environment.
Drawings
Fig. 1 is a schematic diagram of a location-based service query system for privacy protection in a road network environment according to an embodiment of the present invention.
Detailed Description
Specific embodiments of the present invention will now be described in order to provide a clearer understanding of the technical features, objects and effects of the present invention. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the invention, i.e., the embodiments described are merely some, but not all, of the embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
The embodiment provides a Location-based service query system for privacy protection in a Road network environment, as shown in fig. 1, the Location-based service query system includes a trusted center (Trusted Authority, TA), a Location-based service provider (Location-Based Service Provider, LSP) and a Road Side Unit (RSU). The trusted center TA generates system parameters according to the chinese remainder theorem, i.e., the chinese remainder theorem, to realize the registration of the user U and the location-based service provider LSP, and periodically update the system information. The location-based service provider LSP provides a location-based service query to the User (U) according to an unintentional transmission method, the content of the location-based service query including road conditions of the potential route and the optimal route. The roadside unit RSU completes communication between the user U and the location-based service provider LSP, wherein wireless communication between the roadside unit RSU and the user U is implemented by the IEEE802.11p standard, and communication between the roadside unit RSU and the location-based service provider LSP is implemented by a wired link or a low-latency high-bandwidth wireless link.
In this embodiment, it is assumed that the location-based service provider LSP is honest but curious, i.e., it can both perform the operations defined in the protocol correctly and attempt to violate the privacy of the vehicle by analyzing the query report; also, it is assumed that there is an attacker who can eavesdrop on the data transmission and launch an attack. The road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k And } represents where k=1, 2, …, n.
Correspondingly, the embodiment also provides a location service query method based on privacy protection in a road network environment, which comprises a system establishment algorithm, a user registration algorithm, a location server registration algorithm, a location service query algorithm, a location service reply algorithm and a location service reading algorithm, wherein:
(1) System building algorithm: the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curve E:y 2 =x 3 Finite field F formed by points (x, y) of +ax+bmod p p Wherein a, b E F p ,4a 3 +27b 2 Not equal to 0, p is a large prime number; all points (x, y) on E and infinite point O form an additive groupThe generating element is P, and the order is prime number q;
s102, randomly selecting a system master keyWherein->Representing a set of positive integers and computing a system public key P pub =sP;
S104, selecting prime number { q } 1 ,q 2 ,…,q n -and calculate:
the road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k Denoted, where k=1, 2, …, n, for the designation { u } k ,v k Road section allocation alpha k Where k ε {1, …, n };
(2) User registration algorithm: the user U generates the private key sk by the following steps u Public key PK u :
S201, setting a secret value: user U randomly selects secret valuesCalculating a disclosure value X u =x u P, and send the secret value X u And identity information ID u Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret value X u And identity information ID u After that, canMessage center TA random selectionCalculating part of public key R u =r u P and blinded partial private key g u =r u +H 0 (s·X u )+s·H 1 (ID u ,R u ,X u ,P pub ) And return R u And g u Giving the user U;
s203, setting a private key: the user U first calculates a partial private key d u =g u -H 0 (x u ·P pub ) Then verify d u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub Whether or not to establish; if so, the user U sets a private key sk u ={x u ,d u -a }; otherwise, terminate;
s204, setting a public key: user U sets public key PK u ={X u ,R u }。
(3) Based on a location service provider registration algorithm: generating a private key sk based on a location service provider LSP by lsp Public key PK lsp ;
S301, setting a secret value: random selection of secret values based on location service provider LSPsCalculating a disclosure value X lsp =x lsp P, and send the public value X lsp And identity information ID lsp Giving the trusted center TA;
s302, extracting part of private keys: the trusted center TA receives the public value X lsp And identity information ID lsp After that, randomly selectCalculating part of public key R lsp =r lsp P and blinded partial private key g lsp =r lsp +H 0 (s·X lsp )+s·H 1 (ID lsp ,R lsp ,X lsp ,P pub ) And return R lsp And g lsp Giving a location-based service provider LSP;
s303, setting a private key: partial private key d is first calculated based on a location service provider LSP u =g lsp -H 0 (x lsp ·P pub ) Then verify d lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub Whether or not to establish; if so, setting a private key sk based on the location service provider LSP lsp ={x lsp ,d lsp -a }; otherwise, terminate;
s304, setting a public key: setting public key PK based on location service provider LSP lsp ={X lsp ,R lsp }。
(4) Based on a location service query algorithm: assume that the road segment identity { u } is to be queried k ,v k Road conditions, user U generates a query report by:
A u =a u P,B u =b u P,M u =u u +x u A u ,N u =v u +x u B u ,L u =l u P,
σ u =d u +x u H 2 (ID u ,X u ,R u )+l u H 3 (ID u ,A u ,B u ,M u ,N u ,L u );
s402, a user U sends a query report { A } u ,B u ,M u ,N u ,L u ,σ u And to the location-based service provider LSP.
(5) Based on a location service reply algorithm: receiving query report { A > based on location service provider LSP u ,B u ,M u ,N u ,L u ,σ u After } a reply report is generated by:
s501. verifying whether the following equation holds based on the location service provider LSP:
σ u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub +H 2 (ID u ,X u ,R u )X u +H 3 (ID u ,A u ,B u ,M u ,N u ,L u )L u
if true, accept query report { A u ,B u ,M u ,N u ,L u ,σ u -a }; otherwise, refusing;
L lsp =l lsp P,σ lsp =d lsp +x lsp H 2 (ID lsp ,X lsp ,R lsp )+l lsp H 3 (ID lsp ,Θ lsp ,Φ lsp ,Δ lsp ,L lsp );
s503, sending a reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp And to user U.
(6) Based on a location service reading algorithm: user U receives reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp After } the identity { u } is obtained by the following steps k ,v k Road condition data m of road section of } being k :
S601, the user U verifies whether the following equation is satisfied
σ lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub +H 2 (ID lsp ,X lsp ,R lsp )X lsp +H 3 (ID lsp ,Θ lsp ,Φ lsp ,Δ lsp ,L lsp )L lsp
If so, the user U accepts the reply report { Θ } lsp ,Φ lsp ,Δ lsp ,L lsp ,σ lsp -a }; otherwise, refusing;
s602, a user U reads road condition data m k =Δ lsp modα k -H 4 (Φ lsp -x u Θ lsp )。
It should be noted that, for the sake of simplicity of description, the present embodiment is described as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously according to the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
Claims (5)
1. The method for inquiring the privacy protection based on the location service in the road network environment is characterized by comprising the following steps:
the user U and the LSP are registered through a trusted center TA, wherein the trusted center TA generates system parameters according to the Chinese remainder theorem;
providing a location-based service query to a user U according to an unintentional transmission method by a location-based service provider LSP, wherein the content of the location-based service query comprises a road condition of a potential route and an optimal route;
the user U and the LSP based on the location service provider communicate through a roadside unit RSU, wherein wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link;
wherein the method comprises the steps ofRepresenting a positive integer set, +.>For generating the element->For two-dimensional identifier>Secret value randomly selected for user U and +.>,/>Is part of private key, ++>For identity information->Is a secret value and->,/>Is part of a public key and,/>hash function->,/>;
based on location service provider LSP receiving query reportThereafter, a reply report is generated by:
s501. Verifying whether the following equation holds based on the location service provider LSP:
wherein the method comprises the steps ofP pub Is a system parameter; if true, accept query reportThe method comprises the steps of carrying out a first treatment on the surface of the Otherwise, refusing;
the user U receives the reply reportAfter that, the identifier ++is obtained by the following steps>Road condition data of the road section +.>:
S601, the user U verifies whether the following equation is satisfied
If true, the user U accepts the reply reportThe method comprises the steps of carrying out a first treatment on the surface of the Otherwise, refusing; />
2. The location-based service query method of privacy protection in a road network environment according to claim 1, wherein the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curveIs->Formed finite field->Wherein,/>,/>Is a large prime number; />All points on->And infinity point->Formation of addition group->The generation element is->The order is prime->;
S102, randomly selecting a system master keyWherein->Represents a set of positive integers and computes the system public key +.>;
the road area is divided intoEach road segment is defined by a two-dimensional identifier of the approximate position coordinates +.>Representation of->For mark +.>Road section allocation +.>Wherein->;
3. The location service query based method for privacy protection in a road network environment according to claim 2, wherein the implementing of the registration of the user U by the trusted center TA comprises: by usingThe user U generates a private key by the following stepsAnd public key->:
S201, setting a secret value: user U randomly selects secret valuesCalculate the public value->And send the secret valueAnd identity information->Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret valueAnd identity information->Afterwards, the trusted center TA randomly selects +.>Calculate part of the public key +.>And blinded partial private key->And return +.>And->Giving the user U;
s203, setting a private key: user U first calculates a partial private keyThen verifyWhether or not to establish; if so, the user U sets the private key +.>The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, terminate;
4. The location-based service query method for privacy protection in a road network environment as set forth in claim 3, wherein the implementing the registration of the location-based service provider LSP by the trusted center TA comprises: generating a private key based on a location service provider LSP byAnd public key->;
S301, setting a secret value: random selection of secret values based on location service provider LSPsCalculating a disclosure valueAnd sends the public value +.>And identity information->Giving the trusted center TA; />
S302, extracting part of private keys: trusted center TA receives the public valueAnd identity information->After that, randomly selectCalculate part of the public key +.>And blinded partial private key->And return +.>And->Giving a location-based service provider LSP;
s303, setting a private key: partial private key is first calculated based on location service provider LSPThen verify->Whether or not to establish; if so, setting a private key +.>The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, terminate;
5. A query system based on a location-based service query method for privacy protection in a road network environment according to any one of claims 1 to 4, comprising:
a location-based service provider, LSP, for providing a location-based service query to a user U according to an unintentional transmission method, the content of the location-based service query comprising road conditions of potential routes and optimal routes;
the trusted center TA is used for generating system parameters according to the Chinese remainder theorem, namely the Chinese remainder theorem, realizing the registration of the user U and the LSP based on the location service provider and updating the system information periodically;
and the roadside unit RSU is used for completing communication between the user U and the LSP based on the location service provider, wherein wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111199024.0A CN113949989B (en) | 2021-10-14 | 2021-10-14 | Position service query method and system based on privacy protection in road network environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111199024.0A CN113949989B (en) | 2021-10-14 | 2021-10-14 | Position service query method and system based on privacy protection in road network environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113949989A CN113949989A (en) | 2022-01-18 |
CN113949989B true CN113949989B (en) | 2023-05-09 |
Family
ID=79329909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111199024.0A Active CN113949989B (en) | 2021-10-14 | 2021-10-14 | Position service query method and system based on privacy protection in road network environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113949989B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
WO2019006966A1 (en) * | 2017-07-03 | 2019-01-10 | 深圳大学 | Task allocation system model of privacy protected spatial crowdsourcing, and implementation method |
CN111083098A (en) * | 2019-06-17 | 2020-04-28 | 南通大学 | Credible LBS service protocol implementation method based on privacy protection |
-
2021
- 2021-10-14 CN CN202111199024.0A patent/CN113949989B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
WO2019006966A1 (en) * | 2017-07-03 | 2019-01-10 | 深圳大学 | Task allocation system model of privacy protected spatial crowdsourcing, and implementation method |
CN111083098A (en) * | 2019-06-17 | 2020-04-28 | 南通大学 | Credible LBS service protocol implementation method based on privacy protection |
Non-Patent Citations (3)
Title |
---|
Qingyuan Li.《Multi-Level Location Privacy Protection Based on Differential Privacy Strategy in VANETs》.《2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)》.2019,全文. * |
李洪涛.《基于差分隐私的连续位置隐私保护机制》.《通信学报》.2021,全文. * |
陈林 ; 沈航 ; 白光伟 ; 牛晓磊 ; .基于半可信服务器的位置隐私保护策略.计算机工程与设计.2020,(第09期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN113949989A (en) | 2022-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111083098B (en) | Credible LBS service protocol implementation method based on privacy protection | |
Li et al. | Location-sharing systems with enhanced privacy in mobile online social networks | |
Shen et al. | ALERT: an anonymous location-based efficient routing protocol in MANETs | |
Farouk et al. | Efficient privacy-preserving scheme for location based services in VANET system | |
Liu et al. | Bua: A blockchain-based unlinkable authentication in vanets | |
CN106899700B (en) | Privacy protection method of location sharing system in mobile social network | |
Wang et al. | Hybrid conditional privacy-preserving authentication scheme for VANETs | |
Liu et al. | Dynamic anonymous identity authentication (DAIA) scheme for VANET | |
Li et al. | PROS: A privacy-preserving route-sharing service via vehicular fog computing | |
Hasan et al. | WORAL: A witness oriented secure location provenance framework for mobile devices | |
Zeng et al. | Mix-context-based pseudonym changing privacy preserving authentication in VANETs | |
Xie et al. | Provable secure and lightweight vehicle message broadcasting authentication protocol with privacy protection for VANETs | |
Hao et al. | Secure data downloading with privacy preservation in vehicular ad hoc networks | |
CN106856605B (en) | Wireless network anonymous switching authentication method based on false identity | |
CN113949989B (en) | Position service query method and system based on privacy protection in road network environment | |
CN115379418B (en) | Safety communication and conditional privacy protection authentication method suitable for vehicle-mounted ad hoc network | |
Wang et al. | Secure content sharing protocol for D2D users based on profile matching in social networks | |
Sun et al. | Ridra: A rigorous decentralized randomized authentication in VANETs | |
Punitha et al. | Privacy preservation and authentication on secure geographical routing in VANET | |
CN109743728A (en) | A kind of mobile agency meeting network route method of secret protection | |
Wang et al. | An improved lightweight identity authentication protocol for VANET | |
Chen et al. | An anonymous authentication scheme with the enhanced security for wireless communications | |
CN114071463B (en) | Batch authentication method of vehicle-mounted self-organizing network based on bilinear mapping | |
KR101760600B1 (en) | A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Network and System Therefor | |
CN114826716A (en) | Internet of vehicles condition privacy protection method based on certificate-free group signcryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |