LBS-based anti-attack location privacy protection method for IoV

A privacy protection and vehicle networking technology, applied in the field of location privacy protection based on anti-attack, can solve the problems of finding the real identity, Zhang solution is vulnerable to counterfeiting attacks and anti-tracking attacks, and it is difficult for authoritative organizations to achieve the effect of ensuring security.

Active Publication Date: 2016-07-27
JIANGSU UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the protocol also has certain challenges: (1) Each vehicle must have enough storage space to save public-private key pairs and corresponding certificates
(2) Authorities also need a very large storage space to store vehicle certificates
(3) If it is completely anonymous, when the attacker sends an error messa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LBS-based anti-attack location privacy protection method for IoV
  • LBS-based anti-attack location privacy protection method for IoV
  • LBS-based anti-attack location privacy protection method for IoV

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Such as figure 1 As shown, the detection method of the present embodiment has 5 steps, which are respectively:

[0069] (1) Packet encryption and decryption: split the trajectory into two arrays, encrypt them with the public key and send them out, and the receiver uses the private key to decrypt and get the content of the message;

[0070] (2) Message content comparison: to prevent other parties from attacking the server or the service provider from tampering with the request message for profit, so the message must be transferred by a trusted third party during the transmission process, and the service provider and the trusted third party will respectively The service request information in the received message content is extracted, and then sent to the trusted third party by the service provider, and the result matching is performed on the trusted third party. Before matching, check whether the packet is lost. If the packet is lost, then Request resend; if there is no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an LBS (Location Based Service) anti-attack location privacy protection method for IoV (Internet of Vehicles). The method specifically includes five steps of grouping encryption and decryption; message content comparison; service provider signing; result set screening by a trusted third party; feedback of service content to an applicant. According to the invention, the whole communication process is divided into two parts generally: a user requests service from a service provider; and the service provider returns the service content. Discrete logarithm and the Diffie-Hellman are adopted in the above model, bidirectional authentication is supported and save cost and computation cost are reduced substantially. Therefore, privacy protection and service quality are balanced effectively and different types of attacks can be resisted.

Description

technical field [0001] The invention relates to the Internet of Vehicles technology, in particular to an anti-attack based location privacy protection method in the Internet of Vehicles under the background of LBS. Background technique [0002] The Internet of Vehicles is based on the multi-network integration of the intra-vehicle network, the Internet of Vehicles and the vehicle-mounted mobile Internet. "Safety, entertainment, and energy saving" are the main goals. It brings together related technologies such as sensors, RFID, data mining, and automatic control. The standard is to realize the mutual integration of car-X (X: car, road, pedestrian, Internet). While advanced in-vehicle networking technology brings various service experiences to users, due to the characteristics of network self-organization and no center, it faces more serious security threats than ordinary mobile networks. [0003] In the Internet of Vehicles system, location-based service (LBS) applications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0421H04L63/1466H04L2463/121
Inventor 李婷婷王良民陈龙辛燕宋香梅刘芸陈向益
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products