CN113949989B - Position service query method and system based on privacy protection in road network environment - Google Patents

Position service query method and system based on privacy protection in road network environment Download PDF

Info

Publication number
CN113949989B
CN113949989B CN202111199024.0A CN202111199024A CN113949989B CN 113949989 B CN113949989 B CN 113949989B CN 202111199024 A CN202111199024 A CN 202111199024A CN 113949989 B CN113949989 B CN 113949989B
Authority
CN
China
Prior art keywords
lsp
location
user
service provider
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111199024.0A
Other languages
Chinese (zh)
Other versions
CN113949989A (en
Inventor
尉小鹏
赵伟
汤殿华
王林
黄云帆
任娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN202111199024.0A priority Critical patent/CN113949989B/en
Publication of CN113949989A publication Critical patent/CN113949989A/en
Application granted granted Critical
Publication of CN113949989B publication Critical patent/CN113949989B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention discloses a location-based service query method and a system for privacy protection in a road network environment, wherein the method comprises the following steps: the registration of the user and the location-based service provider is realized through a trusted center, wherein the trusted center generates system parameters according to the Chinese remainder theorem; providing a location-based service query including road conditions of potential routes and optimal routes to the user according to an unintentional transmission method by the location-based service provider; communication between subscribers and location-based service providers is via roadside units, where wireless communication between roadside units and subscribers is accomplished by the IEEE802.11p standard and communication between roadside units and location-based service providers is accomplished by wired links or low latency high bandwidth wireless links. The invention can protect the query content and the position privacy of the user, and has smaller calculation cost and communication cost, thereby being more suitable for the position service-based query in the road network environment.

Description

Position service query method and system based on privacy protection in road network environment
Technical Field
The invention relates to the technical field of location-based services, in particular to a location-based service query method and system based on privacy protection in a road network environment.
Background
In a road network environment, a user wants to obtain Location-Based services (LBS), and typically needs to send Location information and query reports to a Location-Based Service provider (LSP) using a wireless communication technology. Typical LBS include: point-of-interest search, route navigation, location-based recommendation services, and the like. However, there is a risk of leakage of the query content and the location information of the user in LBS, for example, the LSP reveals the location privacy and the query content of the user to a malicious adversary due to a benefit relationship. Location privacy disclosure can seriously threaten user property and personal safety, for example, users can infer that the user may have health problems by frequently inquiring road conditions near a hospital; users often use location-based query services during off-hours, and can infer their likely home addresses.
Location privacy preserving LBS have received a lot of attention, and privacy preserving technologies in existing location services mainly include k-anonymization technology, false identity technology, location perturbation technology, homomorphic encryption technology, and careless transmission technology, where:
(1) The basic idea of the k-anonymity technique is that the user sends his own real location and query content to a trusted anonymity server, which generates an anonymity query report for him containing the other k-1 user locations and sends it to the LSP. At this time, the accuracy of LSP-associated users and query reports does not exceed 1/k. However, if the query generated by the anonymizing server is too large, the query overhead of the LSP may be increased.
(2) The main idea of false identity technology is that a false user identity is used for replacing a real user identity when a user sends a request report so as to achieve the purpose of confusing the corresponding relationship between the user identity and the position. However, in the case of low area traffic, an attacker can eavesdrop on the query report and successfully track the target user.
(3) The main idea of random disturbance of location is that the user uses false or disturbed locations instead of his own real locations and adds to the service request. However, a disadvantage of this technique is that the large number of false locations increases the computational overhead of the location-based server and the latency of the query service request.
(4) The main idea of homomorphic encryption technology is to protect the location privacy of a user by operation on ciphertext. However, this technique requires high computational overhead and does not support a scene where the user density is high.
(5) The inadvertent transmission technique protects the user's location privacy by hiding the interrogation location, but the computational overhead and communication costs of this technique are proportional to the data dimension.
In summary, the current privacy protection based location service framework is designed mainly by using k-anonymity, false identity, location disturbance, homomorphic encryption and careless transmission technology, and the privacy of the user location in the k-anonymity based location service framework is easy to eavesdrop; the large number of false locations in the location-based stochastic perturbation framework increases the location-server based computational overhead and the latency of query service requests; scenes with high computation overhead and high user density are not supported in a homomorphic encryption-based framework; the computational and communication overhead in the framework based on the unintentional is proportional to the data dimension.
Disclosure of Invention
In order to solve the problems, the invention provides a position service-based query method and a position service-based query system for privacy protection in a road network environment based on an careless transmission technology and China remainder theorem, which can protect query content and position privacy of users, and have smaller calculation cost and communication cost, so that the method and the system are more suitable for position service-based query in the road network environment.
The technical scheme adopted by the invention is as follows:
a method for inquiring privacy protection based on location service in a road network environment comprises the following steps:
the user U and the LSP are registered through a trusted center TA, wherein the trusted center TA generates system parameters according to the Chinese remainder theorem;
providing a location-based service query to a user U according to an unintentional transmission method by a location-based service provider LSP, wherein the content of the location-based service query comprises a road condition of a potential route and an optimal route;
communication between the subscriber U and the location-based service provider LSP is performed by a roadside unit RSU, wherein wireless communication between the roadside unit RSU and the subscriber U is implemented by an IEEE802.11p standard, and communication between the roadside unit RSU and the location-based service provider LSP is implemented by a wired link or a low-latency high-bandwidth wireless link.
Further, the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curve E:y 2 =x 3 Finite field F formed by points (x, y) of +ax+bmod p p Wherein a, b E F p ,4a 3 +27b 2 Not equal to 0, p is a large prime number; all points (x, y) on E and infinite point O form an additive group
Figure BDA0003304203590000031
The generating element is P, and the order is prime number q;
s102, randomly selecting a system master key
Figure BDA0003304203590000032
Wherein->
Figure BDA0003304203590000033
Representing a set of positive integers and computing a system public key P pub =sP;
S103, selecting a hash function
Figure BDA0003304203590000034
S104, selecting prime number { q } 1 ,q 2 ,…,q n -and calculate:
Figure BDA0003304203590000035
the road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k Denoted, where k=1, 2, …, n, for the designation { u } k ,v k Road section allocation alpha k Where k ε {1, …, n };
s105, publishing system parameters
Figure BDA0003304203590000041
Figure BDA0003304203590000042
And secretly holds a system master key s.
Further, the registering of the user U through the trusted center TA includes: the user U generates the private key sk by the following steps u Public key PK u
S201, setting a secret value: user U randomly selects secret values
Figure BDA0003304203590000043
Calculating a disclosure value X u =x u P, and send the secret value X u And identity information ID u Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret value X u And identity information ID u Thereafter, the trusted center TA randomly selects
Figure BDA0003304203590000044
Calculating part of public key R u =r u P and blinded partial private key g u =r u +H 0 (s·X u )+s·H 1 (ID u ,R u ,X u ,P pub ) And return R u And g u Giving the user U;
s203, setting a private key: the user U first calculates a partial private key d u =g u -H 0 (x u ·P pub ) Then verify d u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub Whether or not to establish; if so, the user U sets a private key sk u ={x u ,d u -a }; otherwise, terminate;
s204, setting a public key: user U sets public key PK u ={X u ,R u }。
Further, the enabling of the registration based on the location service provider LSP by the trusted center TA comprises: generating a private key sk based on a location service provider LSP by lsp Public keyPK lsp
S301, setting a secret value: random selection of secret values based on location service provider LSPs
Figure BDA0003304203590000045
Calculating a disclosure value X lsp =x lsp P, and send the public value X lsp And identity information ID lsp Giving the trusted center TA;
s302, extracting part of private keys: the trusted center TA receives the public value X lsp And identity information ID lsp After that, randomly select
Figure BDA0003304203590000046
Calculating part of public key R lsp =r lsp P and blinded partial private key g lsp =r lsp +H 0 (s·X lsp )+s·H 1 (ID lsp ,R lsp ,X lsp ,P pub ) And return R lsp And g lsp Giving a location-based service provider LSP;
s303, setting a private key: partial private key d is first calculated based on a location service provider LSP u =g lsp -H 0 (x lsp ·P pub ) Then verify d lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub Whether or not to establish; if so, setting a private key sk based on the location service provider LSP lsp ={x lsp ,d lsp -a }; otherwise, terminate;
s304, setting a public key: setting public key PK based on location service provider LSP lsp ={X lsp ,R lsp }。
Further, assume that the road segment identity { u } is to be queried k ,v k Road conditions, user U generates a query report by:
s401 user U random selection
Figure BDA0003304203590000051
And calculating:
A u =a u P,B u =b u P,M u =u u +x u A u ,N u =v u +x u B u ,L u =l u P,
σ u =d u +x u H 2 (ID u ,X u ,R u )+l u H 3 (ID u ,A u ,B u ,M u ,N u ,L u );
s402, a user U sends a query report { A } u ,B u ,M u ,N u ,L uu And to the location-based service provider LSP.
Further, query report { A } is received based on the location service provider LSP u ,B u ,M u ,N u ,L uu After } a reply report is generated by:
s501. verifying whether the following equation holds based on the location service provider LSP:
σ u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub +H 2 (ID u ,X u ,R u )X u +H 3 (ID u ,A u ,B u ,M u ,N u ,L u )L u
if true, accept query report { A u ,B u ,M u ,N u ,L uu -a }; otherwise, refusing;
s502, randomly selecting
Figure BDA0003304203590000052
And calculating:
Figure BDA0003304203590000053
L lsp =l lsp P,σ lsp =d lsp +x lsp H 2 (ID lsp ,X lsp ,R lsp )+l lsp H 3 (ID lsplsplsplsp ,L lsp );
s503, sending a reply report { Θ } lsplsplsp ,L lsplsp And to user U.
Further, user U receives a reply report { Θ } lsplsplsp ,L lsplsp After } the identity { u } is obtained by the following steps k ,v k Road condition data m of road section of } being k
S601, the user U verifies whether the following equation is satisfied
σ lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub +H 2 (ID lsp ,X lsp ,R lsp )X lsp +H 3 (ID lsplsplsplsp ,L lsp )L lsp
If so, the user U accepts the reply report { Θ } lsplsplsp ,L lsplsp -a }; otherwise, refusing;
s602, a user U reads road condition data m k =Δ lsp modα k -H 4lsp -x u Θ lsp )。
A location-based service query system for privacy protection in a road network environment, comprising:
a location-based service provider, LSP, for providing a location-based service query to a user U according to an unintentional transmission method, the content of the location-based service query comprising road conditions of potential routes and optimal routes;
the trusted center TA is used for generating system parameters according to the Chinese remainder theorem, namely the Chinese remainder theorem, realizing the registration of the user U and the LSP based on the location service provider and updating the system information periodically;
and the roadside unit RSU is used for completing communication between the user U and the LSP based on the location service provider, wherein the wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and the communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link.
The invention has the beneficial effects that:
existing privacy-preserving location-based service frameworks are designed primarily with k-anonymity, false identity, location perturbation, homomorphic encryption, and careless transmission techniques. However, the existing solutions are either relatively poor in performance (high computational overhead and communication bandwidth), or cannot meet the security requirements (query content and location privacy protection) in the road network environment. The position service-based query method and system for privacy protection in the road network environment can protect the query content and position privacy of the user, and simultaneously has smaller calculation cost and communication cost, so that the method and system are more suitable for position service-based query in the road network environment.
Drawings
Fig. 1 is a schematic diagram of a location-based service query system for privacy protection in a road network environment according to an embodiment of the present invention.
Detailed Description
Specific embodiments of the present invention will now be described in order to provide a clearer understanding of the technical features, objects and effects of the present invention. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the invention, i.e., the embodiments described are merely some, but not all, of the embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
The embodiment provides a Location-based service query system for privacy protection in a Road network environment, as shown in fig. 1, the Location-based service query system includes a trusted center (Trusted Authority, TA), a Location-based service provider (Location-Based Service Provider, LSP) and a Road Side Unit (RSU). The trusted center TA generates system parameters according to the chinese remainder theorem, i.e., the chinese remainder theorem, to realize the registration of the user U and the location-based service provider LSP, and periodically update the system information. The location-based service provider LSP provides a location-based service query to the User (U) according to an unintentional transmission method, the content of the location-based service query including road conditions of the potential route and the optimal route. The roadside unit RSU completes communication between the user U and the location-based service provider LSP, wherein wireless communication between the roadside unit RSU and the user U is implemented by the IEEE802.11p standard, and communication between the roadside unit RSU and the location-based service provider LSP is implemented by a wired link or a low-latency high-bandwidth wireless link.
In this embodiment, it is assumed that the location-based service provider LSP is honest but curious, i.e., it can both perform the operations defined in the protocol correctly and attempt to violate the privacy of the vehicle by analyzing the query report; also, it is assumed that there is an attacker who can eavesdrop on the data transmission and launch an attack. The road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k And } represents where k=1, 2, …, n.
Correspondingly, the embodiment also provides a location service query method based on privacy protection in a road network environment, which comprises a system establishment algorithm, a user registration algorithm, a location server registration algorithm, a location service query algorithm, a location service reply algorithm and a location service reading algorithm, wherein:
(1) System building algorithm: the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curve E:y 2 =x 3 Finite field F formed by points (x, y) of +ax+bmod p p Wherein a, b E F p ,4a 3 +27b 2 Not equal to 0, p is a large prime number; all points (x, y) on E and infinite point O form an additive group
Figure BDA0003304203590000081
The generating element is P, and the order is prime number q;
s102, randomly selecting a system master key
Figure BDA0003304203590000082
Wherein->
Figure BDA0003304203590000083
Representing a set of positive integers and computing a system public key P pub =sP;
S103, selecting a hash function
Figure BDA0003304203590000084
S104, selecting prime number { q } 1 ,q 2 ,…,q n -and calculate:
Figure BDA0003304203590000085
the road area is divided into n road segments, each road segment being defined by a two-dimensional identifier { u } of approximate location coordinates k ,v k Denoted, where k=1, 2, …, n, for the designation { u } k ,v k Road section allocation alpha k Where k ε {1, …, n };
s105, publishing system parameters
Figure BDA0003304203590000086
Figure BDA0003304203590000087
And secretly holds a system master key s.
(2) User registration algorithm: the user U generates the private key sk by the following steps u Public key PK u
S201, setting a secret value: user U randomly selects secret values
Figure BDA0003304203590000088
Calculating a disclosure value X u =x u P, and send the secret value X u And identity information ID u Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret value X u And identity information ID u After that, canMessage center TA random selection
Figure BDA0003304203590000091
Calculating part of public key R u =r u P and blinded partial private key g u =r u +H 0 (s·X u )+s·H 1 (ID u ,R u ,X u ,P pub ) And return R u And g u Giving the user U;
s203, setting a private key: the user U first calculates a partial private key d u =g u -H 0 (x u ·P pub ) Then verify d u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub Whether or not to establish; if so, the user U sets a private key sk u ={x u ,d u -a }; otherwise, terminate;
s204, setting a public key: user U sets public key PK u ={X u ,R u }。
(3) Based on a location service provider registration algorithm: generating a private key sk based on a location service provider LSP by lsp Public key PK lsp
S301, setting a secret value: random selection of secret values based on location service provider LSPs
Figure BDA0003304203590000092
Calculating a disclosure value X lsp =x lsp P, and send the public value X lsp And identity information ID lsp Giving the trusted center TA;
s302, extracting part of private keys: the trusted center TA receives the public value X lsp And identity information ID lsp After that, randomly select
Figure BDA0003304203590000093
Calculating part of public key R lsp =r lsp P and blinded partial private key g lsp =r lsp +H 0 (s·X lsp )+s·H 1 (ID lsp ,R lsp ,X lsp ,P pub ) And return R lsp And g lsp Giving a location-based service provider LSP;
s303, setting a private key: partial private key d is first calculated based on a location service provider LSP u =g lsp -H 0 (x lsp ·P pub ) Then verify d lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub Whether or not to establish; if so, setting a private key sk based on the location service provider LSP lsp ={x lsp ,d lsp -a }; otherwise, terminate;
s304, setting a public key: setting public key PK based on location service provider LSP lsp ={X lsp ,R lsp }。
(4) Based on a location service query algorithm: assume that the road segment identity { u } is to be queried k ,v k Road conditions, user U generates a query report by:
s401 user U random selection
Figure BDA0003304203590000101
And calculating:
A u =a u P,B u =b u P,M u =u u +x u A u ,N u =v u +x u B u ,L u =l u P,
σ u =d u +x u H 2 (ID u ,X u ,R u )+l u H 3 (ID u ,A u ,B u ,M u ,N u ,L u );
s402, a user U sends a query report { A } u ,B u ,M u ,N u ,L uu And to the location-based service provider LSP.
(5) Based on a location service reply algorithm: receiving query report { A > based on location service provider LSP u ,B u ,M u ,N u ,L uu After } a reply report is generated by:
s501. verifying whether the following equation holds based on the location service provider LSP:
σ u P=R u +H 1 (ID u ,R u ,X u ,P pub )P pub +H 2 (ID u ,X u ,R u )X u +H 3 (ID u ,A u ,B u ,M u ,N u ,L u )L u
if true, accept query report { A u ,B u ,M u ,N u ,L uu -a }; otherwise, refusing;
s502, randomly selecting
Figure BDA0003304203590000102
And calculating:
Figure BDA0003304203590000103
L lsp =l lsp P,σ lsp =d lsp +x lsp H 2 (ID lsp ,X lsp ,R lsp )+l lsp H 3 (ID lsplsplsplsp ,L lsp );
s503, sending a reply report { Θ } lsplsplsp ,L lsplsp And to user U.
(6) Based on a location service reading algorithm: user U receives reply report { Θ } lsplsplsp ,L lsplsp After } the identity { u } is obtained by the following steps k ,v k Road condition data m of road section of } being k
S601, the user U verifies whether the following equation is satisfied
σ lsp P=R lsp +H 1 (ID lsp ,R lsp ,X lsp ,P pub )P pub +H 2 (ID lsp ,X lsp ,R lsp )X lsp +H 3 (ID lsplsplsplsp ,L lsp )L lsp
If so, the user U accepts the reply report { Θ } lsplsplsp ,L lsplsp -a }; otherwise, refusing;
s602, a user U reads road condition data m k =Δ lsp modα k -H 4lsp -x u Θ lsp )。
It should be noted that, for the sake of simplicity of description, the present embodiment is described as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously according to the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.

Claims (5)

1. The method for inquiring the privacy protection based on the location service in the road network environment is characterized by comprising the following steps:
the user U and the LSP are registered through a trusted center TA, wherein the trusted center TA generates system parameters according to the Chinese remainder theorem;
providing a location-based service query to a user U according to an unintentional transmission method by a location-based service provider LSP, wherein the content of the location-based service query comprises a road condition of a potential route and an optimal route;
the user U and the LSP based on the location service provider communicate through a roadside unit RSU, wherein wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link;
suppose that road segment identification is to be queried
Figure QLYQS_1
The user U generates a query report by:
s401 user U randomly selects
Figure QLYQS_2
And calculating:
Figure QLYQS_3
,/>
Figure QLYQS_4
,/>
Figure QLYQS_5
,/>
Figure QLYQS_6
,/>
Figure QLYQS_7
Figure QLYQS_8
wherein the method comprises the steps of
Figure QLYQS_11
Representing a positive integer set, +.>
Figure QLYQS_16
For generating the element->
Figure QLYQS_20
For two-dimensional identifier>
Figure QLYQS_10
Secret value randomly selected for user U and +.>
Figure QLYQS_14
,/>
Figure QLYQS_18
Is part of private key, ++>
Figure QLYQS_21
For identity information->
Figure QLYQS_9
Is a secret value and->
Figure QLYQS_13
,/>
Figure QLYQS_17
Is part of a public key and
Figure QLYQS_22
,/>
Figure QLYQS_12
hash function->
Figure QLYQS_15
,/>
Figure QLYQS_19
S402, the user U sends a query report
Figure QLYQS_23
Giving a location-based service provider LSP;
based on location service provider LSP receiving query report
Figure QLYQS_24
Thereafter, a reply report is generated by:
s501. Verifying whether the following equation holds based on the location service provider LSP:
Figure QLYQS_25
wherein the method comprises the steps ofP pub Is a system parameter; if true, accept query report
Figure QLYQS_26
The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, refusing;
s502 random selection
Figure QLYQS_27
And calculating:
Figure QLYQS_28
,/>
Figure QLYQS_29
,/>
Figure QLYQS_30
Figure QLYQS_31
,/>
Figure QLYQS_32
s503, sending a reply report
Figure QLYQS_33
Giving the user U;
the user U receives the reply report
Figure QLYQS_34
After that, the identifier ++is obtained by the following steps>
Figure QLYQS_35
Road condition data of the road section +.>
Figure QLYQS_36
S601, the user U verifies whether the following equation is satisfied
Figure QLYQS_37
If true, the user U accepts the reply report
Figure QLYQS_38
The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, refusing; />
S602, the user U reads road condition data
Figure QLYQS_39
2. The location-based service query method of privacy protection in a road network environment according to claim 1, wherein the trusted center TA generates system parameters by:
s101, selecting a satisfied elliptic curve
Figure QLYQS_42
Is->
Figure QLYQS_45
Formed finite field->
Figure QLYQS_48
Wherein
Figure QLYQS_43
,/>
Figure QLYQS_46
,/>
Figure QLYQS_49
Is a large prime number; />
Figure QLYQS_51
All points on->
Figure QLYQS_40
And infinity point->
Figure QLYQS_44
Formation of addition group->
Figure QLYQS_47
The generation element is->
Figure QLYQS_50
The order is prime->
Figure QLYQS_41
S102, randomly selecting a system master key
Figure QLYQS_52
Wherein->
Figure QLYQS_53
Represents a set of positive integers and computes the system public key +.>
Figure QLYQS_54
S103, selecting a hash function
Figure QLYQS_55
,/>
Figure QLYQS_56
S104, selecting prime numbers
Figure QLYQS_57
And calculating:
Figure QLYQS_58
,/>
Figure QLYQS_59
,/>
Figure QLYQS_60
,/>
Figure QLYQS_61
the road area is divided into
Figure QLYQS_62
Each road segment is defined by a two-dimensional identifier of the approximate position coordinates +.>
Figure QLYQS_63
Representation of->
Figure QLYQS_64
For mark +.>
Figure QLYQS_65
Road section allocation +.>
Figure QLYQS_66
Wherein->
Figure QLYQS_67
S105, publishing system parameters
Figure QLYQS_68
Figure QLYQS_69
And secretly store the system master key +.>
Figure QLYQS_70
3. The location service query based method for privacy protection in a road network environment according to claim 2, wherein the implementing of the registration of the user U by the trusted center TA comprises: by usingThe user U generates a private key by the following steps
Figure QLYQS_71
And public key->
Figure QLYQS_72
S201, setting a secret value: user U randomly selects secret values
Figure QLYQS_73
Calculate the public value->
Figure QLYQS_74
And send the secret value
Figure QLYQS_75
And identity information->
Figure QLYQS_76
Giving the trusted center TA;
s202, extracting part of private keys: receipt of secret value
Figure QLYQS_77
And identity information->
Figure QLYQS_78
Afterwards, the trusted center TA randomly selects +.>
Figure QLYQS_79
Calculate part of the public key +.>
Figure QLYQS_80
And blinded partial private key->
Figure QLYQS_81
And return +.>
Figure QLYQS_82
And->
Figure QLYQS_83
Giving the user U;
s203, setting a private key: user U first calculates a partial private key
Figure QLYQS_84
Then verify
Figure QLYQS_85
Whether or not to establish; if so, the user U sets the private key +.>
Figure QLYQS_86
The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, terminate;
s204, setting a public key: user U sets public key
Figure QLYQS_87
4. The location-based service query method for privacy protection in a road network environment as set forth in claim 3, wherein the implementing the registration of the location-based service provider LSP by the trusted center TA comprises: generating a private key based on a location service provider LSP by
Figure QLYQS_88
And public key->
Figure QLYQS_89
S301, setting a secret value: random selection of secret values based on location service provider LSPs
Figure QLYQS_90
Calculating a disclosure value
Figure QLYQS_91
And sends the public value +.>
Figure QLYQS_92
And identity information->
Figure QLYQS_93
Giving the trusted center TA; />
S302, extracting part of private keys: trusted center TA receives the public value
Figure QLYQS_94
And identity information->
Figure QLYQS_95
After that, randomly select
Figure QLYQS_96
Calculate part of the public key +.>
Figure QLYQS_97
And blinded partial private key->
Figure QLYQS_98
And return +.>
Figure QLYQS_99
And->
Figure QLYQS_100
Giving a location-based service provider LSP;
s303, setting a private key: partial private key is first calculated based on location service provider LSP
Figure QLYQS_101
Then verify->
Figure QLYQS_102
Whether or not to establish; if so, setting a private key +.>
Figure QLYQS_103
The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, terminate;
s304, setting a public key: setting public keys based on location service provider LSPs
Figure QLYQS_104
5. A query system based on a location-based service query method for privacy protection in a road network environment according to any one of claims 1 to 4, comprising:
a location-based service provider, LSP, for providing a location-based service query to a user U according to an unintentional transmission method, the content of the location-based service query comprising road conditions of potential routes and optimal routes;
the trusted center TA is used for generating system parameters according to the Chinese remainder theorem, namely the Chinese remainder theorem, realizing the registration of the user U and the LSP based on the location service provider and updating the system information periodically;
and the roadside unit RSU is used for completing communication between the user U and the LSP based on the location service provider, wherein wireless communication between the roadside unit RSU and the user U is realized by an IEEE802.11p standard, and communication between the roadside unit RSU and the LSP based on the location service provider is realized by a wired link or a low-delay high-bandwidth wireless link.
CN202111199024.0A 2021-10-14 2021-10-14 Position service query method and system based on privacy protection in road network environment Active CN113949989B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111199024.0A CN113949989B (en) 2021-10-14 2021-10-14 Position service query method and system based on privacy protection in road network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111199024.0A CN113949989B (en) 2021-10-14 2021-10-14 Position service query method and system based on privacy protection in road network environment

Publications (2)

Publication Number Publication Date
CN113949989A CN113949989A (en) 2022-01-18
CN113949989B true CN113949989B (en) 2023-05-09

Family

ID=79329909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111199024.0A Active CN113949989B (en) 2021-10-14 2021-10-14 Position service query method and system based on privacy protection in road network environment

Country Status (1)

Country Link
CN (1) CN113949989B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618995A (en) * 2013-12-04 2014-03-05 西安电子科技大学 Position privacy protection method based on dynamic pseudonyms
WO2019006966A1 (en) * 2017-07-03 2019-01-10 深圳大学 Task allocation system model of privacy protected spatial crowdsourcing, and implementation method
CN111083098A (en) * 2019-06-17 2020-04-28 南通大学 Credible LBS service protocol implementation method based on privacy protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618995A (en) * 2013-12-04 2014-03-05 西安电子科技大学 Position privacy protection method based on dynamic pseudonyms
WO2019006966A1 (en) * 2017-07-03 2019-01-10 深圳大学 Task allocation system model of privacy protected spatial crowdsourcing, and implementation method
CN111083098A (en) * 2019-06-17 2020-04-28 南通大学 Credible LBS service protocol implementation method based on privacy protection

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Qingyuan Li.《Multi-Level Location Privacy Protection Based on Differential Privacy Strategy in VANETs》.《2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)》.2019,全文. *
李洪涛.《基于差分隐私的连续位置隐私保护机制》.《通信学报》.2021,全文. *
陈林 ; 沈航 ; 白光伟 ; 牛晓磊 ; .基于半可信服务器的位置隐私保护策略.计算机工程与设计.2020,(第09期),全文. *

Also Published As

Publication number Publication date
CN113949989A (en) 2022-01-18

Similar Documents

Publication Publication Date Title
CN111083098B (en) Credible LBS service protocol implementation method based on privacy protection
Li et al. Location-sharing systems with enhanced privacy in mobile online social networks
Shen et al. ALERT: an anonymous location-based efficient routing protocol in MANETs
Farouk et al. Efficient privacy-preserving scheme for location based services in VANET system
Liu et al. Bua: A blockchain-based unlinkable authentication in vanets
CN106899700B (en) Privacy protection method of location sharing system in mobile social network
Wang et al. Hybrid conditional privacy-preserving authentication scheme for VANETs
Liu et al. Dynamic anonymous identity authentication (DAIA) scheme for VANET
Li et al. PROS: A privacy-preserving route-sharing service via vehicular fog computing
Hasan et al. WORAL: A witness oriented secure location provenance framework for mobile devices
Zeng et al. Mix-context-based pseudonym changing privacy preserving authentication in VANETs
Xie et al. Provable secure and lightweight vehicle message broadcasting authentication protocol with privacy protection for VANETs
Hao et al. Secure data downloading with privacy preservation in vehicular ad hoc networks
CN106856605B (en) Wireless network anonymous switching authentication method based on false identity
CN113949989B (en) Position service query method and system based on privacy protection in road network environment
CN115379418B (en) Safety communication and conditional privacy protection authentication method suitable for vehicle-mounted ad hoc network
Wang et al. Secure content sharing protocol for D2D users based on profile matching in social networks
Sun et al. Ridra: A rigorous decentralized randomized authentication in VANETs
Punitha et al. Privacy preservation and authentication on secure geographical routing in VANET
CN109743728A (en) A kind of mobile agency meeting network route method of secret protection
Wang et al. An improved lightweight identity authentication protocol for VANET
Chen et al. An anonymous authentication scheme with the enhanced security for wireless communications
CN114071463B (en) Batch authentication method of vehicle-mounted self-organizing network based on bilinear mapping
KR101760600B1 (en) A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Network and System Therefor
CN114826716A (en) Internet of vehicles condition privacy protection method based on certificate-free group signcryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant