[1] |
LAI C Z , LU R X , ZHENG D ,et al. Security and privacy challenges in 5G-enabled vehicular networks[J]. IEEE Network, 2020,34(2): 37-45.
|
[2] |
ZHANG J , CUI J , ZHONG H ,et al. PA-CRT:Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 722-735.
|
[3] |
LAI C Z , ZHANG K , CHENG N ,et al. SIRC:a secure incentive scheme for reliable cooperative downloading in highway VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(6): 1559-1574.
|
[4] |
YANG Y , DANG S P , HE Y J ,et al. Markov decision-based pilot optimization for 5G V2X vehicular communications[J]. IEEE Internet of Things Journal, 2019,6(1): 1090-1103.
|
[5] |
HE D B , ZEADALLY S , XU B W ,et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12): 2681-2691.
|
[6] |
HU L , QIAN Y F , CHEN M ,et al. Proactive cache-based location privacy preserving for vehicle networks[J]. IEEE Wireless Communications, 2018,25(6): 77-83.
|
[7] |
张文静, 刘樵, 朱辉 . 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019,40(12): 51-59.
|
|
ZHANG W J , LIU Q , ZHU H . Evaluation and protection of multi-level location privacy based on an information theoretic approach[J]. Journal on Communications, 2019,40(12): 51-59.
|
[8] |
叶阿勇, 孟玲玉, 赵子文 ,等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4): 123-133.
|
|
YE A Y , MENG L Y , ZHAO Z W ,et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on Communications, 2020,41(4): 123-133.
|
[9] |
LI Q Y , WU H , WU X ,et al. Multi-level location privacy protection based on differential privacy strategy in VANETs[C]// 2019 IEEE 89th Vehicular Technology Conference. Piscataway:IEEE Press, 2019: 1-5.
|
[10] |
ZHANG Y , TONG W , ZHONG S . On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy[J]. IEEE Transactions on Information Forensics and Security, 2016,11(11): 2528-2541.
|
[11] |
LIU B , ZHOU W L , ZHU T Q ,et al. Silence is golden:enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(12): 9942-9953.
|
[12] |
CUI J , ZHANG X Y , ZHONG H ,et al. Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 1654-1667.
|
[13] |
CHENG J J , CHENG J L , ZHOU M C ,et al. Routing in Internet of vehicles:a review[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,16(5): 2339-2352.
|
[14] |
YI X , PAULET R , BERTINO E ,et al. Practical k nearest neighbor queries with location privacy[C]// 2014 IEEE 30th International Conference on Data Engineering. Piscataway:IEEE Press, 2014: 640-651.
|
[15] |
PAULET R , KAOSAR M G , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210.
|
[16] |
BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55.
|
[17] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems,Applications and Services. Berkeley:USENIX Association, 2003: 31-42.
|
[18] |
裴卓雄, 李兴华, 刘海 ,等. LBS 隐私保护中基于查询范围的匿名区构造方案[J]. 通信学报, 2017,38(9): 125-132.
|
|
PEI Z X , LI X H , LIU H ,et al. Anonymizing region construction scheme based on query range in location-based service privacy protection[J]. Journal on Communications, 2017,38(9): 125-132.
|
[19] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. New York:ACM Press, 2006: 171-178.
|
[20] |
CUI J , WEN J Y , HAN S S ,et al. Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network[J]. IEEE Internet of Things Journal, 2018,5(5): 3491-3498.
|
[21] |
REN W T , TANG S H . EGeoIndis:an effective and efficient location privacy protection framework in traffic density detection[J]. Vehicular Communications, 2020,21:100187.
|
[22] |
PAN J J , LIU Y N , ZHANG W M . Detection of dummy trajectories using convolutional neural networks[J]. Security and Communication Networks, 2019,2019: 1-12.
|
[23] |
AMINI S , LINDQVIST J , HONG J ,et al. Caché:caching location-enhanced content to improve user privacy[C]// Proceedings of the 9th International Conference on Mobile Systems,Applications,and Services. New York:ACM Press, 2011: 197-210.
|
[24] |
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:LocationPrivacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279.
|
[25] |
NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[C]// 2015 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2015: 1017-1025.
|
[26] |
PENG T , LIU Q , MENG D C ,et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017,387: 165-179.
|
[27] |
ZHANG S B , CHOO K K R , LIU Q ,et al. Enhancing privacy through uniform grid and caching in location-based services[J]. Future Generation Computer Systems, 2018,86: 881-892.
|
[28] |
MENEZES A J , VANSTONE S A . Elliptic curve cryptosystems and their implementation[J]. Journal of Cryptology, 1993,6(4): 209-224.
|
[29] |
CUI J , ZHANG X Y , ZHONG H ,et al. RSMA:reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks[J]. IEEE Internet of Things Journal, 2019,6(4): 6417-6428.
|
[30] |
PETIT J , SCHAUB F , FEIRI M ,et al. Pseudonym schemes in vehicular networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2015,17(1): 228-255.
|
[31] |
LAI C Z , ZHANG M , CAO J ,et al. SPIR:a secure and privacy-preserving incentive scheme for reliable real-time map updates[J]. IEEE Internet of Things Journal, 2020,7(1): 416-428.
|
[32] |
CHENG J J , YUAN G Y , ZHOU M C ,et al. A fluid mechanics-based data flow model to estimate VANET capacity[J]. IEEE Transactions on Intelligent Transportation Systems, 2020,21(6): 2603-2614.
|
[33] |
CAO Y , XIAO Y H , XIONG L ,et al. PriSTE:from location privacy to spatiotemporal event privacy[C]// 2019 IEEE 35th International Conference on Data Engineering. Piscataway:IEEE Press, 2019: 1606-1609.
|
[34] |
SOMMER C , GERMAN R , DRESSLER F . Bidirectionally coupled network and road traffic simulation for improved IVC analysis[J]. IEEE Transactions on Mobile Computing, 2011,10(1): 3-15.
|