期刊文献+

A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET 被引量:2

A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET
下载PDF
导出
摘要 Existing location privacypreserving methods,without a trusted third party,cannot resist conspiracy attacks and active attacks.This paper proposes a novel solution for location based service(LBS) in vehicular ad hoc network(VANET).Firstly,the relationship among anonymity degree,expected company area and vehicle density is discussed.Then,a companion set V is set up by k neighbor vehicles.Based on secure multi-party computation,each vehicle in V can compute the centroid,not revealing its location to each other.The centroid as a cloaking location is sent to LBS provider(P)and P returns a point of interest(POI).Due to a distributed secret sharing structure,P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles.To detect fake data from dishonest vehicles,zero knowledge proof is adopted.Comparing with other related methods,our solution can resist passive and active attacks from internal and external nodes.It provides strong privacy protection for LBS in VANET. Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.
出处 《China Communications》 SCIE CSCD 2014年第9期60-67,共8页 中国通信(英文版)
基金 the National Natural Science Foundation of China,by the Natural Science Foundation of Anhui Province,by the Specialized Research Fund for the Doctoral Program of Higher Education of China,the Fundamental Research Funds for the Central Universities
关键词 基于位置的服务 隐私保护 主动攻击 车辆密度 自组织网络 零知识证明 LBS 保护方法 vehicular ad hoc network locationbased services location k-anonymity securemulti-party computation
  • 相关文献

参考文献22

  • 1BERESFORD A R, STAJANO F. Location Privacy in Pervasive Computing [J]. IEEE Pervasive Com- puting, 2003, 2(1): 46-55.
  • 2HUANG L, MATSUURA K, YAMANE H, et al. En- hancing wireless location privacy using silent period [C]//IEEE WCNC 2005. IEEE, 2005, 2: 1187-1192.
  • 3FREUDIGER J, RAYA M, FELEGYHAZI M, et al. Mix-zones for location privacy in vehicular net- works[C]//Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS). 2007.
  • 4JADLIWALA M, BILOGREVIC I, HUBAUX J P. Op- timizing mix-zone coverage in pervasive wire- less networks[J]. Journal of Computer Security, 2013, 21(3): 317-346.
  • 5SCHEUER F, FUCHS K R FEDERRATH H. A safe- ty-preserving mix zone for VANETs[M]. Trust, Privacy and Security in Digital Business. Spring- er Berlin Heidelberq, 2011: 37-48.
  • 6XUE X, DING J. LPA: a new location-based privacy-preserving authentication protocol in VANET[J]. Security Comm. Networks, 2012:69-78,.
  • 7SWEENEY L. k-anonymity: a model for protect- ing privacy [J]. International Journal of Uncer- tainty, Fuzziness and Knowledge Based Systems, 2002, 10 (5): 557-570.
  • 8GRUTESER M, GRUNWALD D. Anonymous us- age of location-based services through spatial and temporal cloaking[C]//Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, 2003: 31-42.
  • 9-'rl , GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: Architecture and al- gorithms [J]. IEEE Transactions on Mobile Com- puting. 2008, 7 (1): 1-18.
  • 10ZHAO Z M, LI L, ZHANG F, ZHANG P, ZHOU J O WANG J B. The location privacy protection method with dispersed sub cloaking region[J]. Journal of Shandong University( Natural Sci-ence), 2013,48(7):56-61.

二级参考文献139

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 3Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 5Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.
  • 6Mokbel M F, Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy//Proceedings of the International Conference on Very Large Data Bases (VLDB'06). New York, USA, 2006: 763-774.
  • 7Xiao Z, Meng X, Xu J. Quality-aware privacy protection for location-based services//Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA'07). Bangkok, Thailand, 2007: 434 446.
  • 8Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transac tions on Mobile Computing, 2008, 7(1): 1-18.
  • 9Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privaeygrid// Proceedings of the International World Wide Web Conference (WWW'08). Beijing, China, 2008.- 237 246.
  • 10Chow C, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the Annual ACM International Symposium on Advances in Geographic Information Systems (GIS'06). Virginia, USA, 2006:171-178.

共引文献236

同被引文献31

  • 1中华人民共和国国家统计局.中国统计年鉴2014[EB/OL].http://www.stats.gov.cn/,2015-03-18.
  • 2Mokbel M F. Privacy in location-based services:State- of-the-art and research directions [ C ]//2007 International Conference on Mobile Data Management. Mannheim, Germany : IEEE ,2007:228.
  • 3Zheng Kai, Shang Shuo, Yuan N J, et al. Towards efficient search for activity trajectories [ C ]// Proceedings of the 29th IEEE International Conference on Data Engineering. Brisbane, Australia : IEEE, 2013 : 230-241.
  • 4Abowd G D, Atkeson C G, Hong J, et al. CyberGuide : A mobile context-aware tour guide [ J ]. Wireless Networks, 1997,3 (5) :421-433.
  • 5NextBus Inc. NextBus [ EB/OL ]. http://www. nextbus, com,2015-03-30.
  • 6Gruteser M, Grunwald D. Anonymous usage of location- based services through spatial and temporal cloaking [ C ]//Proceeding of the 1st International Conference on Mobile Systems, Applications and Services ( MobiSys'03 ). New York, USA : ACM,2003 : 31-42.
  • 7Kido H, Yanagisaway Y, Satoh T. An anonymous com- munication technique using dummies for location-based services [ C 1//Proceeding of International Conference on Pervasive Services 2005 ( ICPS' 05 ). Munich, Germany : IEEE,2005:88-97.
  • 8Yiu M L, Jensen C S, Huang Xuegang, et al. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services [ C J//IEEE 24th International Conference on Data Engineering (ICDE 2008 ). Cancun, Mexico : IEEE,2008:366-375.
  • 9Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy [ C ]//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases ( SSTD'07 ). Boston, MA, USA: Springer-Verlag Berlin,Heidelberg,2007:239-257.
  • 10Kalnis P, Ghinita G, Mouratidis K A. Preventing location-based identity inference in anonymous spatial queries [ J ]. IEEE Transactions on Knowledge and Data Engineering,2007,19 (12) : 1719-1733.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部