VANETs position privacy protection query method under fog computing architecture

A privacy protection and fog computing technology, applied in the field of network security, can solve problems such as no solution, inability to meet mobility, real-time, security, etc.

Active Publication Date: 2018-05-08
NORTHEASTERN UNIV
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some studies have proposed the combination of in-vehicle network and fog computing, but there is no mature solution yet
The location privacy protection of vehicle users in VANETs has received extensive attention. In order to solve the location privacy protec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VANETs position privacy protection query method under fog computing architecture
  • VANETs position privacy protection query method under fog computing architecture
  • VANETs position privacy protection query method under fog computing architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0061] This embodiment applies the anonymous forwarding chain technology to the service query process of the vehicle nodes of the VANETs protocol, and uses the technology based on the anonymous forwarding chain, which effectively protects the location privacy of the vehicle nodes, effectively reduces the calculation overhead, and reduces the calculation of querying the vehicle side. Pressure, improve the overall query efficiency.

[0062] The VANETs query environment involved in this embodiment is as follows figure 1 As shown, the third-party trusted organization TA is connected to two roadside units RSU through a wired security channel, and the roadside unit RSU is connected to the vehicle-mounted unit OBU. It is assumed that the on-board unit OBU has completed the initial two-way authentication with the roadside unit RSU. fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a VANETs position privacy protection query method under a fog computing architecture, which comprises the following steps: both a roadside unit RSU and a vehicular unit OBU areregistered to a third-party trust mechanism TA; a ring is formed between the adjacent roadside units RSU; the roadside unit RSU in the ring serves as a fog node in the ring and is provided with a pioneer node and a successor node, and a shared secret key is arranged between the adjacent roadside units RSU in the ring; when the vehicular unit OBU is connected to the vehicular self-organizing network VANETs for the first time, bidirectional access authentication is carried out between the vehicular unit OBU and the roadside unit RSU, and a temporary query code PID is issued to the OBU by the roadside unit RSU; and a query based on a position service is completed between the vehicular unit OBU and the roadside unit RSU by adopting an anonymous forwarding chain generated based on the ring formed by the roadside unit RSU. According to the method in the invention, the anonymous forwarding chain technology is applied to the process of a vehicle node of the VANETs protocol to carry out serviceinquiry; the anonymous forwarding chain technology is used, so that the position privacy of the vehicle node is effectively protected.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a VANETs position privacy protection query method under the fog computing framework. Background technique [0002] With the introduction of the concept of smart city and smart transportation, it provides good opportunities and broad prospects for the development of Vehicular Ad Hoc Networks (VANETs). It has attracted more and more attention from scholars at home and abroad. In VANETs, ​​it is often necessary to provide third-party application services to improve the experience of vehicle users and meet the increasingly rich application requirements of users. This requires OBU to access LBS through VANETs. For example, a user accesses a location-based server (Location Based Server, LBS) in the cloud through an application program, and the LBS feeds back a response result to the user according to the user request. For example, a user requests LBS to find a nearby bank AT...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/02H04W4/44H04W12/02H04W12/06H04L29/08H04L29/06H04W12/00
CPCH04L63/0421H04L63/0435H04L67/12H04W12/02H04W12/06
Inventor 高天寒李艳强
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products