Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao
{"title":"基于位置的车联网路径隐私保护方案","authors":"Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162709","DOIUrl":null,"url":null,"abstract":"With the rapid development of Vehicular Ad-hoc Network (VANETs), Frequently communication between vehicles and base stations has generated a large amount of trajectory information. The vehicle trajectory data can be used for real-time traffic management, intelligent driving and onboard entertainment, but it brings huge storage pressure and risk of privacy leakage. Although existing trajectory protection algorithms can generate a large number of similar trajectories, these virtual trajectories are easily identified by an attacker and cannot be virtualized according to vehicles needs. Based on the existing rotation algorithms, we proposes a virtual trajectory generation algorithm(VTG), which generates corresponding virtual points according to the user's needs at each positions and form virtual trajectories through connecting virtual position points. At the same time, the edge node are regarded as trusted third party to ensure physical control in the privacy protection model and served as a bridge between users and Location Based Services (LBS) while storing part of trajectory data. Finally, the effectiveness and security of the method are verified through a large number of simulations, our experiments indicate that the method can provide better privacy protection for users.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Location-Based Path Privacy Protection Scheme in Internet of Vehicles\",\"authors\":\"Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao\",\"doi\":\"10.1109/INFOCOMWKSHPS50562.2020.9162709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of Vehicular Ad-hoc Network (VANETs), Frequently communication between vehicles and base stations has generated a large amount of trajectory information. The vehicle trajectory data can be used for real-time traffic management, intelligent driving and onboard entertainment, but it brings huge storage pressure and risk of privacy leakage. Although existing trajectory protection algorithms can generate a large number of similar trajectories, these virtual trajectories are easily identified by an attacker and cannot be virtualized according to vehicles needs. Based on the existing rotation algorithms, we proposes a virtual trajectory generation algorithm(VTG), which generates corresponding virtual points according to the user's needs at each positions and form virtual trajectories through connecting virtual position points. At the same time, the edge node are regarded as trusted third party to ensure physical control in the privacy protection model and served as a bridge between users and Location Based Services (LBS) while storing part of trajectory data. Finally, the effectiveness and security of the method are verified through a large number of simulations, our experiments indicate that the method can provide better privacy protection for users.\",\"PeriodicalId\":104136,\"journal\":{\"name\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
随着车载自组织网络(VANETs)的快速发展,车辆与基站之间频繁的通信产生了大量的轨迹信息。车辆轨迹数据可用于实时交通管理、智能驾驶和车载娱乐,但也带来了巨大的存储压力和隐私泄露风险。虽然现有的轨迹保护算法可以生成大量相似的轨迹,但这些虚拟轨迹很容易被攻击者识别,无法根据车辆的需要进行虚拟化。在现有旋转算法的基础上,提出了一种虚拟轨迹生成算法(VTG),该算法在每个位置根据用户的需要生成相应的虚拟点,并通过连接虚拟位置点形成虚拟轨迹。同时,在隐私保护模型中,边缘节点作为可信第三方来保证物理控制,在存储部分轨迹数据的同时,充当用户与LBS (Location Based Services)之间的桥梁。最后,通过大量的仿真验证了该方法的有效性和安全性,实验表明该方法可以为用户提供更好的隐私保护。
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles
With the rapid development of Vehicular Ad-hoc Network (VANETs), Frequently communication between vehicles and base stations has generated a large amount of trajectory information. The vehicle trajectory data can be used for real-time traffic management, intelligent driving and onboard entertainment, but it brings huge storage pressure and risk of privacy leakage. Although existing trajectory protection algorithms can generate a large number of similar trajectories, these virtual trajectories are easily identified by an attacker and cannot be virtualized according to vehicles needs. Based on the existing rotation algorithms, we proposes a virtual trajectory generation algorithm(VTG), which generates corresponding virtual points according to the user's needs at each positions and form virtual trajectories through connecting virtual position points. At the same time, the edge node are regarded as trusted third party to ensure physical control in the privacy protection model and served as a bridge between users and Location Based Services (LBS) while storing part of trajectory data. Finally, the effectiveness and security of the method are verified through a large number of simulations, our experiments indicate that the method can provide better privacy protection for users.