Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Traffic monitoring system and method for custom privacy protection against jamming attacks

A privacy protection, custom technology, applied in the field of anonymous authentication and Internet of Vehicles, can solve the problems of location privacy leakage, no consideration, interference attack, etc., to protect identity information, protect from being leaked, and realize the effect of location privacy protection

Active Publication Date: 2022-03-15
INTELLIGENT MFG INST OF HFUT
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. It is not considered that malicious attackers use multiple physical devices to submit traffic information of a certain location at the same time, so as to forge the false traffic congestion situation of the location and carry out interference attacks;
[0006] 2. Even in an anonymous environment, the traffic information collector can still obtain the traffic information submitter's movement pattern by analyzing multiple traffic information submitted by the same traffic information submitter, resulting in the leakage of location privacy;
[0007] 3. Even in an anonymous environment, the summary monitoring party can still obtain its motion pattern by analyzing the access request of the same traffic information access party, resulting in the leakage of location privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic monitoring system and method for custom privacy protection against jamming attacks
  • Traffic monitoring system and method for custom privacy protection against jamming attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In this embodiment, a traffic monitoring system that supports self-defined privacy protection against interference attacks, such as figure 1 As shown, it includes identity information maintenance module, anonymous processing module, traffic information monitoring module, several traffic information processing combination modules and several traffic information access combination modules, each traffic information processing combination module includes: traffic information service module, traffic information Information collection module, each traffic information access combination module includes: traffic information query module, traffic information report module;

[0079] like figure 2 As shown, the identity information maintenance module includes: a parameter setting unit, a registration processing unit, a login processing unit, and an identity information database;

[0080] The anonymous processing module includes: user registration unit, user login unit, login tok...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-defined privacy protection traffic monitoring system and method against interference attacks. The system includes an identity information maintenance module, an anonymous processing module, a traffic information reporting module, a traffic information collection module, a traffic information query module, a traffic information Service module, traffic information monitoring module; traffic information reporting module sends traffic information to traffic information collection module; traffic information collection module summarizes traffic information to traffic information monitoring module; traffic information query module queries traffic information from traffic information service module, traffic information The service module verifies the query request and returns corresponding traffic information. The invention can resist the interference attacks of malicious users in traffic monitoring, realize the anonymization of user identity information, and realize the privacy protection of user-defined positions, thereby ensuring the authenticity of traffic information collected by the traffic monitoring system and protecting the privacy information of system users.

Description

technical field [0001] The invention belongs to the fields of anonymous authentication and Internet of Vehicles, and specifically relates to a traffic monitoring system and method for anti-interference attack and self-defined privacy protection. Background technique [0002] Traffic monitoring technology can collect real-time traffic information in the urban road network, provide users with road condition query services through the obtained traffic information, and help users choose the optimal travel route, thereby saving users' time costs and energy consumption. The urban road planning department can also optimize the urban road network based on the collected traffic information. [0003] Although traffic monitoring technology facilitates people's travel, the authenticity of the collected traffic information still faces various threats. Malicious attackers can mislead by submitting false traffic information, causing the traffic monitoring system to make wrong judgments. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/40H04L9/40G06F16/21G06F16/2453G06F21/33
CPCH04W4/40H04L63/0421H04L63/083G06F16/219G06F16/24534G06F21/33
Inventor 李萌赵旌程胡东辉杨彬
Owner INTELLIGENT MFG INST OF HFUT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products