Journal on Communications ›› 2021, Vol. 42 ›› Issue (7): 150-161.doi: 10.11959/j.issn.1000-436x.2021132
• Papers • Previous Articles Next Articles
Jie CUI1,2,3, Xuefeng CHEN1, Jing ZHANG1, Lu WEI1, Hong ZHONG1,2,3
Revised:
2020-12-15
Online:
2021-07-25
Published:
2021-07-01
Supported by:
CLC Number:
Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles[J]. Journal on Communications, 2021, 42(7): 150-161.
[1] | LAI C Z , LU R X , ZHENG D ,et al. Security and privacy challenges in 5G-enabled vehicular networks[J]. IEEE Network, 2020,34(2): 37-45. |
[2] | ZHANG J , CUI J , ZHONG H ,et al. PA-CRT:Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 722-735. |
[3] | LAI C Z , ZHANG K , CHENG N ,et al. SIRC:a secure incentive scheme for reliable cooperative downloading in highway VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(6): 1559-1574. |
[4] | YANG Y , DANG S P , HE Y J ,et al. Markov decision-based pilot optimization for 5G V2X vehicular communications[J]. IEEE Internet of Things Journal, 2019,6(1): 1090-1103. |
[5] | HE D B , ZEADALLY S , XU B W ,et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12): 2681-2691. |
[6] | HU L , QIAN Y F , CHEN M ,et al. Proactive cache-based location privacy preserving for vehicle networks[J]. IEEE Wireless Communications, 2018,25(6): 77-83. |
[7] | 张文静, 刘樵, 朱辉 . 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019,40(12): 51-59. |
ZHANG W J , LIU Q , ZHU H . Evaluation and protection of multi-level location privacy based on an information theoretic approach[J]. Journal on Communications, 2019,40(12): 51-59. | |
[8] | 叶阿勇, 孟玲玉, 赵子文 ,等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4): 123-133. |
YE A Y , MENG L Y , ZHAO Z W ,et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on Communications, 2020,41(4): 123-133. | |
[9] | LI Q Y , WU H , WU X ,et al. Multi-level location privacy protection based on differential privacy strategy in VANETs[C]// 2019 IEEE 89th Vehicular Technology Conference. Piscataway:IEEE Press, 2019: 1-5. |
[10] | ZHANG Y , TONG W , ZHONG S . On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy[J]. IEEE Transactions on Information Forensics and Security, 2016,11(11): 2528-2541. |
[11] | LIU B , ZHOU W L , ZHU T Q ,et al. Silence is golden:enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(12): 9942-9953. |
[12] | CUI J , ZHANG X Y , ZHONG H ,et al. Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 1654-1667. |
[13] | CHENG J J , CHENG J L , ZHOU M C ,et al. Routing in Internet of vehicles:a review[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,16(5): 2339-2352. |
[14] | YI X , PAULET R , BERTINO E ,et al. Practical k nearest neighbor queries with location privacy[C]// 2014 IEEE 30th International Conference on Data Engineering. Piscataway:IEEE Press, 2014: 640-651. |
[15] | PAULET R , KAOSAR M G , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210. |
[16] | BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55. |
[17] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems,Applications and Services. Berkeley:USENIX Association, 2003: 31-42. |
[18] | 裴卓雄, 李兴华, 刘海 ,等. LBS 隐私保护中基于查询范围的匿名区构造方案[J]. 通信学报, 2017,38(9): 125-132. |
PEI Z X , LI X H , LIU H ,et al. Anonymizing region construction scheme based on query range in location-based service privacy protection[J]. Journal on Communications, 2017,38(9): 125-132. | |
[19] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. New York:ACM Press, 2006: 171-178. |
[20] | CUI J , WEN J Y , HAN S S ,et al. Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network[J]. IEEE Internet of Things Journal, 2018,5(5): 3491-3498. |
[21] | REN W T , TANG S H . EGeoIndis:an effective and efficient location privacy protection framework in traffic density detection[J]. Vehicular Communications, 2020,21:100187. |
[22] | PAN J J , LIU Y N , ZHANG W M . Detection of dummy trajectories using convolutional neural networks[J]. Security and Communication Networks, 2019,2019: 1-12. |
[23] | AMINI S , LINDQVIST J , HONG J ,et al. Caché:caching location-enhanced content to improve user privacy[C]// Proceedings of the 9th International Conference on Mobile Systems,Applications,and Services. New York:ACM Press, 2011: 197-210. |
[24] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:LocationPrivacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279. |
[25] | NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[C]// 2015 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2015: 1017-1025. |
[26] | PENG T , LIU Q , MENG D C ,et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017,387: 165-179. |
[27] | ZHANG S B , CHOO K K R , LIU Q ,et al. Enhancing privacy through uniform grid and caching in location-based services[J]. Future Generation Computer Systems, 2018,86: 881-892. |
[28] | MENEZES A J , VANSTONE S A . Elliptic curve cryptosystems and their implementation[J]. Journal of Cryptology, 1993,6(4): 209-224. |
[29] | CUI J , ZHANG X Y , ZHONG H ,et al. RSMA:reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks[J]. IEEE Internet of Things Journal, 2019,6(4): 6417-6428. |
[30] | PETIT J , SCHAUB F , FEIRI M ,et al. Pseudonym schemes in vehicular networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2015,17(1): 228-255. |
[31] | LAI C Z , ZHANG M , CAO J ,et al. SPIR:a secure and privacy-preserving incentive scheme for reliable real-time map updates[J]. IEEE Internet of Things Journal, 2020,7(1): 416-428. |
[32] | CHENG J J , YUAN G Y , ZHOU M C ,et al. A fluid mechanics-based data flow model to estimate VANET capacity[J]. IEEE Transactions on Intelligent Transportation Systems, 2020,21(6): 2603-2614. |
[33] | CAO Y , XIAO Y H , XIONG L ,et al. PriSTE:from location privacy to spatiotemporal event privacy[C]// 2019 IEEE 35th International Conference on Data Engineering. Piscataway:IEEE Press, 2019: 1606-1609. |
[34] | SOMMER C , GERMAN R , DRESSLER F . Bidirectionally coupled network and road traffic simulation for improved IVC analysis[J]. IEEE Transactions on Mobile Computing, 2011,10(1): 3-15. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[3] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[4] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[5] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[6] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[7] | Lei ZHANG, Yu WANG, Jianjie TIAN, Lin ZHANG, Tianjiao ZHANG. Joint beam forming design for IRS-aided MIMO Internet of vehicles system [J]. Journal on Communications, 2023, 44(2): 59-69. |
[8] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[9] | Rong ZENG, Xiao HANG. Reconfigurable intelligent surface assist wireless channel estimation algorithm in Internet of vehicles environment [J]. Journal on Communications, 2022, 43(8): 142-150. |
[10] | Xiang CHENG, Haotian ZHANG, Zonghui YANG, Ziwei HUANG, Sijiang LI, Anlan YU. Integrated sensing and communications for Internet of vehicles:current status and development trend [J]. Journal on Communications, 2022, 43(8): 188-202. |
[11] | Peng QIN, Haoting HE, Xiongwen ZHAO, Yang FU, Yu ZHANG, Miao WANG, Shuo WANG, Xue WU. Efficient resource allocation with context-awareness for parked car road side unit-based Internet of vehicles [J]. Journal on Communications, 2022, 43(7): 113-125. |
[12] | Yanfei SUN, Jiazheng YIN, Jin QI, Xiaoxuan HU, Mengting CHEN, Zhenjiang DONG. Topology control based on dynamic graph embedding in Internet of vehicles [J]. Journal on Communications, 2022, 43(6): 133-142. |
[13] | Sifeng ZHU, Jianghao CAI, Zhengyi CHAI, Enlin SUN. Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles [J]. Journal on Communications, 2022, 43(6): 223-234. |
[14] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[15] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|