Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-interference and anti-attack traffic monitoring system and method capable of customizing privacy protection

A privacy-preserving and customized technology, applied in the fields of anonymous authentication and Internet of Vehicles, it can solve the problems of location privacy leakage, interference attack, and lack of consideration, and achieve the effect of protecting identity information, protecting it from being leaked, and realizing location privacy protection.

Active Publication Date: 2021-06-01
INTELLIGENT MFG INST OF HFUT
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. It is not considered that malicious attackers use multiple physical devices to submit traffic information of a certain location at the same time, so as to forge the false traffic congestion situation of the location and carry out interference attacks;
[0006] 2. Even in an anonymous environment, the traffic information collector can still obtain the traffic information submitter's movement pattern by analyzing multiple traffic information submitted by the same traffic information submitter, resulting in the leakage of location privacy;
[0007] 3. Even in an anonymous environment, the summary monitoring party can still obtain its motion pattern by analyzing the access request of the same traffic information access party, resulting in the leakage of location privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-interference and anti-attack traffic monitoring system and method capable of customizing privacy protection
  • Anti-interference and anti-attack traffic monitoring system and method capable of customizing privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In this embodiment, a traffic monitoring system that supports self-defined privacy protection against interference attacks, such as figure 1 As shown, it includes identity information maintenance module, anonymous processing module, traffic information monitoring module, several traffic information processing combination modules and several traffic information access combination modules, each traffic information processing combination module includes: traffic information service module, traffic information Information collection module, each traffic information access combination module includes: traffic information query module, traffic information report module;

[0079] Such as figure 2 As shown, the identity information maintenance module includes: a parameter setting unit, a registration processing unit, a login processing unit, and an identity information database;

[0080] The anonymous processing module includes: user registration unit, user login unit, login ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-interference and anti-attack traffic monitoring system and method capable of customizing privacy protection. The system comprises an identity information maintenance module, an anonymous processing module, a traffic information report module, a traffic information collection module, a traffic information query module, a traffic information service module and a traffic information monitoring module. The traffic information reporting module sends traffic information to the traffic information collection module; the traffic information collection module gathers traffic information to the traffic information monitoring module; the traffic information query module queries traffic information from the traffic information service module, and the traffic information service module verifies a query request and returns corresponding traffic information. According to the method, interference attacks of malicious users can be resisted in traffic monitoring, user identity information anonymization is realized, and user-defined position privacy protection is realized, so that the authenticity of traffic information collected by a traffic monitoring system is ensured, and privacy information of system users is protected.

Description

technical field [0001] The invention belongs to the fields of anonymous authentication and Internet of Vehicles, and specifically relates to a traffic monitoring system and method for anti-interference attack and self-defined privacy protection. Background technique [0002] Traffic monitoring technology can collect real-time traffic information in the urban road network, provide users with road condition query services through the obtained traffic information, and help users choose the optimal travel route, thereby saving users' time costs and energy consumption. The urban road planning department can also optimize the urban road network based on the collected traffic information. [0003] Although traffic monitoring technology facilitates people's travel, the authenticity of the collected traffic information still faces various threats. Malicious attackers can mislead by submitting false traffic information, causing the traffic monitoring system to make wrong judgments. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/40H04L29/06G06F16/21G06F16/2453G06F21/33
CPCH04W4/40H04L63/0421H04L63/083G06F16/219G06F16/24534G06F21/33
Inventor 李萌赵旌程胡东辉杨彬
Owner INTELLIGENT MFG INST OF HFUT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products