信息网络安全 ›› 2019, Vol. 19 ›› Issue (4): 63-72.doi: 10.3969/j.issn.1671-1122.2019.04.008
收稿日期:
2019-01-10
出版日期:
2019-04-10
发布日期:
2020-05-11
作者简介:
作者简介:李怡霖(1995—),男,陕西,硕士研究生,主要研究方向为车载网络中的安全与隐私保护;闫峥(1972—),女,陕西,教授,博士,主要研究方向为信任管理和可信计算、信息与网络安全、隐私保护等;谢皓萌(1994—),男,陕西,博士,主要研究方向为隐私保护、信任管理。
基金资助:
Yilin LI1, Zheng YAN1,2(), Haomeng XIE1
Received:
2019-01-10
Online:
2019-04-10
Published:
2020-05-11
摘要:
车载自组织网络(Vehicular Ad-hoc Networks,VANET)作为一种智能交通系统,能够提升交通的安全和效率。 VANET是通过专用短程通信(Dedicated Short Range Communication,DSRC)为移动车辆提供无线通信的新型网络。在VANET中,车辆可以与其他车辆以及固定在路边的路边单元(Road Side Unit, RSU)进行通信。与此同时,VANET所存在的隐私问题同样不容忽视。VANET具有开放性访问、无线通信等特性,恶意节点攻击可能会导致VANET中用户隐私的泄露,从而严重影响VANET的使用,因此隐私保护是VANET研究的关键。已有的研究成果总结了VANET中多种用户隐私保护方案,然而绝大多数未能对隐私保护方案进行分类,也没有制定出方案评价的详细标准。文章对VANET中的隐私攻击方式进行了分类,并提出了一系列评估标准,从而能够详细评估隐私保护方案的性能。
中图分类号:
李怡霖, 闫峥, 谢皓萌. 车载自组织网络的隐私保护综述[J]. 信息网络安全, 2019, 19(4): 63-72.
Yilin LI, Zheng YAN, Haomeng XIE. Survey of Privacy Preservation in VANET[J]. Netinfo Security, 2019, 19(4): 63-72.
表1
位置隐私保护方案性能分析
位置隐私 保护方案 | 抵抗 相关性攻击 | 抵抗恶意服务商 攻击 | 查询内容加密 | 是否 依靠 可信 第三方 | 服务 质量 | 计算 开销 | 条件 隐私 保护 | |
---|---|---|---|---|---|---|---|---|
针对V2V通信的 位置隐私保护方案 | 文献[ | 高 | 高 | 是 | 是 | 低 | 中 | 是 |
文献[ | 中 | 中 | 是 | 是 | 高 | 中 | 是 | |
文献[ | 否 | 不涉及 | 是 | 是 | 高 | 低 | 是 | |
针对V2I通信的 位置隐私保护方案 | 文献[ | 不涉及 | 高 | 是 | 是 | 高 | 高 | 是 |
文献[ | 不涉及 | 高 | 是 | 否 | 中 | 高 | 否 | |
文献[ | 不涉及 | 高 | 是 | 是 | 中 | 中 | 是 | |
文献[ | 否 | 低 | 否 | 否 | 高 | 中 | 否 | |
文献[ | 低 | 中 | 是 | 是 | 中 | 高 | 是 | |
文献[ | 不涉及 | 高 | 否 | 否 | 高 | 高 | 否 |
[1] | RAYA M, HUBAUX J P.Securing Vehicular Ad-hoc Networks[J]. Journal of Computer Security, 2007, 15(1): 39-68. |
[2] | TALEB T, SAKHAEE E, JAMALIPOUR A, et al.A Stable Routing Protocol to Support ITS Services in VANET Networks[J]. IEEE Transactions on Vehicular Technology, 2007, 56(6): 3337-3347. |
[3] | SHEN Xia, CHENG Xiang, YANG Liuqing, et al.Data Dissemination in VANETs: A Scheduling Approach[J]. IEEE Transactions on Intelligent Transportation Systems, 2014, 15(5): 2213-2223. |
[4] | YANG Liuqing, WANG FeiYue. Driving into Intelligent Spaces with Pervasive Communications[J]. IEEE Intelligent Systems, 2007, 22(1): 12-15. |
[5] | ZHANG Jianming, ZHAO Yujuan, JIANG Haobin, et al.Research on Protection Technology for Location Privacy in VANET[J]. Journal on Communications, 2012, 33(8): 180-189. |
张建明,赵玉娟,江浩斌,等. 车辆自组网的位置隐私保护技术研究[J]. 通信学报,2012,33(8):180-189. | |
[6] | KALAIARASY C, SREENATH N.An Incentive Based Cooperation Motivating Pseudonym Changing Strategy for Privacy Preservation in Mixed Zones in Vehicular Networks[J]. Journal of King Saud University Computer and Information Sciences, 2018, 18(5): 1-11. |
[7] | QU Fengzhong, WU Zhihui, WANG Feiyue, et al.A Security and Privacy Review of VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(6): 2985-2996. |
[8] | BOUALOUACHE A, SENOUCI S M, MOUSSAOUI S.A Survey on Pseudonym Changing Strategies for Vehicular Ad-hoc Networks[J]. IEEE Communications Surveys & Tutorials, 2017, 20(1): 770-790. |
[9] | MA Mingjie, DU Yuejin, LI Fenghua, et al.Review of Semantic-Based Privacy-Preserving Approaches in LBS[J]. Chinese Journal of Network and Information Security, 2016, 2(12): 1-11. |
马明杰,杜跃进,李凤华,等. 基于语义的位置服务隐私保护综述[J].网络与信息安全学报,2016,2(12): 1-11. | |
[10] | LUCKSHETTY A, DONTAL S, TANGADE S, et al.A Survey: Comparative Study of Applications, Attacks, Security and Privacy in VANETs[C]// IEEE. 2016 International Conference on Communication and Signal Processing (ICCSP), April 6-8, 2016, Melmaruvathur, India. New York: IEEE, 2016: 1594-1598. |
[11] | HUANG Leping, MATSUURA K, YAMANE H, et al.Enhancing Wireless Location Privacy Using Silent Period[C]// IEEE. IEEE Wireless Communications and Networking Conference, March 13-17, 2005, New Orleans, LA, USA. New York: IEEE, 2005: 1187-1192. |
[12] | YAN Zheng, WANG Mingjun.Protect Pervasive Social Networking Based on Two Dimensional Trust Levels[J]. IEEE Systems Journal, 2017, 11(1): 207-218. |
[13] | MEJRI M N, BEN O J.GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs[J]. IEEE Transactions on Mobile Computing, 2017, 16(3): 759-771. |
[14] | KANG Jiawen, YU Rong, HUANG Xumin, et al.Location Privacy Attacks and Defenses in Cloud-enabled Internet of Vehicles[J]. IEEE Wireless Communications, 2016, 23(5): 52-59. |
[15] | CORSER G, FU Huirong, SHU Tao, et al.Privacy by Decoy: Protecting Location Privacy Against Collusion and Deanonymization in Vehicular Location Based Services[C]// IEEE. 2014 IEEE Intelligent Vehicles Symposium Proceedings, June 8-11, 2014, Dearborn, MI, USA. New York: IEEE, 2014: 1030-1036. |
[16] | JIANG Hong, KANG Baoyuan, LI Chunqing.Improved Auditing Schemes with Identity Preserving for The Integrity of Shared Data in The Cloud[J]. Netinfo Security, 2018, 18(10): 85-91. |
姜红,亢保元,李春青. 改进的保护身份的云共享数据完整性公开审计方案[J]. 信息网络安全,2018,18(10):85-91. | |
[17] | PAN Xiao, XIAO Zhen, MENG Xiaofeng.Survey of Location Privacy Preserving[J]. Journal of Computer Science and Frontiers, 2007, 1(3): 268-281. |
潘晓,肖珍,孟小峰. 位置隐私研究综述[J]. 计算机科学与探索,2007,1(3):268-281. | |
[18] | TAHA S, SHEN Xuemin.A Physical layer Location Privacy Preserving Scheme for Mobile Public Hotspots in NEMO Based VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2013, 14(4): 1665-1680. |
[19] | CORSER G P, FU Huirong, BANIHANI A.Evaluating Location Privacy in Vehicular Communications and Applications[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(9): 2658-2667. |
[20] | NIU Ben, LI Qinghua, ZHU Xiaoyan, et al.Achieving K-Anonymity in Privacy Aware Location Based Services[C]// IEEE. IEEE INFOCOM 2014-IEEE Conference on Computer Communications, April 27- May 2, 2014, Toronto, ON, Canada. New York: IEEE, 2014: 754-762. |
[21] | YU Ruiyun, BAI Zhihong, YANG Leyou, et al.A Location Cloaking Algorithm Based on Combinatorial Optimization for Location Based Services in 5G Networks[J]. IEEE Access, 2016, 4(10): 6515-6527. |
[22] | CUI Jie, WEN Jingyu, HAN Shunshun, et al.Efficient Privacy Preserving Scheme for Real ime Location Data in Vehicular Ad-hoc Network[J]. IEEE Internet of Things Journal, 2018, 5(5): 3491-3498. |
[23] | SAMPIGETHAYA K, HUANG Leping, LI Mingyan, et al.CARAVAN: Providing Location Privacy for VANET[R]. Seattle: University of Washington, Department of Electrical Engineering, 98195, 2005. |
[24] | HU Hao, LU Rongxing, ZHANG Zonghua, et al.REPLACE: A Reliable Trust Based Platoon Service Recommendation Scheme in VANET[J]. IEEE Transactions on Vehicular Technology, 2017, 66(2): 1786-1797. |
[25] | HUANG Yan, CAI Zhipeng, BOURGEOIS A G.Search Locations Safely and Accurately: A Location Privacy Protection Algorithm with Accurate Service[J]. Journal of Network and Computer Applications, 2018, 10(3): 146-156. |
[26] | LIU J K, CHU ChengKang, CHOW S S M, et al. Time Bound Anonymous Authentication for Roaming Networks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 178-189. |
[27] | CABALLERO G C, MOLINA G J, HERNANDEZ S J, et al.Providing K-Anonymity and Revocation in Ubiquitous VANETs[J]. Ad Hoc Networks, 2016, 36(2): 482-494. |
[28] | YAO Lin, LIN Chi, DENG Jing, et al.Biometrics-based Data Link Layer Anonymous Authentication in VANETs[C]// IEEE. 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 3-5, 2013, Taichung, Taiwan, China. New York: IEEE, 2013: 182-187. |
[29] | BISWAS S, MIŠIC J. A Cross Layer Approach to Privacy-Preserving Authentication in Wave-enabled VANETs[J]. IEEE Transactions on Vehicular Technology, 2013, 62(5): 2182-2192. |
[30] | SUN Yipin, FENG Zhenqian, HU Qiaolin, et al.An Efficient Distributed Key Management Scheme for Group-Signature Based Anonymous Authentication in VANET[J]. Security and Communication Networks, 2012, 5(1): 79-86. |
[31] | CHAURASIA B K, VERMA S.Transactions on Computational Science[M]. Berlin, Heidelberg: Springer, 2011. |
[32] | WANG Mingjun, YAN Zheng.Privacy Preserving Authentication and Key Agreement Protocols for D2D Group Communications[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3637-3647. |
[33] | YAN Zheng, WANG Pu, FENG Wei.A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking[J]. Information Sciences, 2018, 445(20): 79-96. |
[34] | JIANG Yixin, SHI Minghui, SHEN Xuemin, et al.BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree[J]. IEEE Transactions on Wireless Communications, 2009, 8(4): 1974-1983. |
[35] | CUI Jie, WEI Lu, ZHANG Jing, et al.An Efficient Message Authentication Scheme Based on Edge Computing for Vehicular Ad-hoc Networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 18(5): 1-12. |
[36] | LI Ning, YAN Zheng, WANG Mingjun, et al.Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE[J]. ACM Transactions on Cyber Physical Systems, 2018, 3(1): 1-17. |
[37] | CAO Suzhen, LANG Xiaoli, LIU Xiangzhen, et al.A New Heterogeneous Signcryption Scheme in 5G Network[J]. Netinfo Security, 2018, 18(11): 33-39. |
曹素珍,郎晓丽,刘祥震,等. 5G网络下新的异构签密方案[J]. 信息网络安全,2018,18(11):33-39. | |
[38] | LU Zhaojun, QU Gang, LIU Zhenglin.A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(2): 760-776. |
[39] | FENG Wei, YAN Zheng, ZHANG Hengrun, et al.A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing[J]. IEEE Internet of Things Journal, 2018, 5(4): 2971-2992. |
[40] | CHEN Yang, WANG Yong.A New Trust-Based AODV Routing Protocol and Performance Optimization towards Wireless Ad-hoc Networks[J]. Netinfo Security, 2018, 18(2): 40-47. |
陈阳,王勇. 移动Ad Hoc网络中一种安全的AODV路由协议及性能优化[J]. 信息网络安全,2018,18(2):40-47. |
[1] | 刘建伟, 韩祎然, 刘斌, 余北缘. 5G网络切片安全模型研究[J]. 信息网络安全, 2020, 20(4): 1-11. |
[2] | 江金芳, 韩光洁. 无线传感器网络中信任管理机制研究综述[J]. 信息网络安全, 2020, 20(4): 12-20. |
[3] | 傅智宙, 王利明, 唐鼎, 张曙光. 基于同态加密的HBase二级密文索引方法研究[J]. 信息网络安全, 2020, 20(4): 55-64. |
[4] | 赵志岩, 纪小默. 智能化网络安全威胁感知融合模型研究[J]. 信息网络安全, 2020, 20(4): 87-93. |
[5] | 马力. 网络安全等级保护测评中结论产生的定量计算方法研究[J]. 信息网络安全, 2020, 20(3): 1-8. |
[6] | 李宁, 李柏潮. 移动互联网的通行证式统一威胁管理架构[J]. 信息网络安全, 2020, 20(3): 18-28. |
[7] | 张兴隆, 李钰汀, 程庆丰, 郭路路. 一种防范TLS协议降级攻击的浏览器安全模型[J]. 信息网络安全, 2020, 20(3): 65-74. |
[8] | 黎水林, 祝国邦, 范春玲, 陈广勇. 一种新的等级测评综合得分算法研究[J]. 信息网络安全, 2020, 20(2): 1-6. |
[9] | 王晓, 赵军, 张建标. 基于可信软件基的虚拟机动态监控机制研究[J]. 信息网络安全, 2020, 20(2): 7-13. |
[10] | 郎为民, 张汉, 赵毅丰, 姚晋芳. 一种基于区块链的物联网行为监控和活动管理方案[J]. 信息网络安全, 2020, 20(2): 22-29. |
[11] | 姚萌萌, 唐黎, 凌永兴, 肖卫东. 基于串空间的安全协议形式化分析研究[J]. 信息网络安全, 2020, 20(2): 30-36. |
[12] | 喻露, 罗森林. RBAC模式下数据库内部入侵检测方法研究[J]. 信息网络安全, 2020, 20(2): 83-90. |
[13] | 唐春明, 林旭慧. 隐私保护集合交集计算协议[J]. 信息网络安全, 2020, 20(1): 9-15. |
[14] | 荆涛, 万巍. 面向属性迁移状态的P2P网络行为分析方法研究[J]. 信息网络安全, 2020, 20(1): 16-25. |
[15] | 胡蝶, 马东堂, 龚旻, 马召. 一种基于PUF的物理层安全认证方法[J]. 信息网络安全, 2020, 20(1): 61-66. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||