通信学报 ›› 2013, Vol. 34 ›› Issue (Z1): 240-245.doi: 10.3969/j.issn.1000-436x.2013.z1.032

• 技术报告 • 上一篇    下一篇

车载自组网节点轨迹隐私攻防博弈模型

杨卫东1,2,何云华2,3,孙利民2,3   

  1. 1 河南工业大学 信息科学与工程学院, 河南 郑州 450001
    2 中国科学院 信息工程研究所 信息安全国家重点实验室, 北京 100093
    3 西安电子科技大学 计算机学院, 陕西 西安 710071
  • 出版日期:2013-08-25 发布日期:2017-06-23
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;中国博士后科学基金资助项目

Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks

Wei-dong YANG1,2,Yun-hua HE2,3,Li-min SUN2,3   

  1. 1 College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001, China
    2 SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3 School of Computer Science and Technology, Xidian University, Xi'an 710071, China
  • Online:2013-08-25 Published:2017-06-23
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The China Postdoctoral Science Foundation Funded Project

摘要:

针对主动攻击所发布车辆轨迹隐私的场景,利用信息熵量化攻击者和防御者的能力,采用博弈论对车辆轨迹隐私攻击和防御进行建模,并给出攻击和防御策略,分析了攻防双方之间的博弈过程。通过对真实轨迹数据分析,得出完全信息博弈下的纳什均衡点和相应攻击策略下的最优防御策略。

关键词: 车载自组织网络, 轨迹, 隐私保护, 博弈论

Abstract:

The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented.

Key words: vehicular ad-hoc networks, trace, privacy preserving, game theory

No Suggested Reading articles found!