计算机应用 ›› 2017, Vol. 37 ›› Issue (7): 1921-1925.DOI: 10.11772/j.issn.1001-9081.2017.07.1921

• 网络空间安全 • 上一篇    下一篇

车联网轨迹隐私保护研究进展

张春花1, 臧海娟2, 薛小平1, 张芳1, 陈康强1, 冯丽娟1   

  1. 1. 同济大学 电子与信息工程学院, 上海 201804;
    2. 江苏理工学院 计算机工程学院, 江苏 常州 213001
  • 收稿日期:2017-01-24 修回日期:2017-03-23 出版日期:2017-07-10 发布日期:2017-07-18
  • 通讯作者: 臧海娟
  • 作者简介:张春花(1989-),女,山东莒县人,博士研究生,主要研究方向:信息安全、隐私保护;臧海娟(1965-),女,江苏常州人,副教授,博士,主要研究方向:网络与信息安全;薛小平(1963-),男,上海人,教授,主要研究方向:可信计算、信息安全;张芳(1971-),女,上海人,讲师,博士,主要研究方向:可信计算;陈康强(1992-),男,浙江金华人,硕士研究生,主要研究方向:VANET隐私与安全;冯丽娟(1994-),女,四川雅安人,硕士研究生,主要研究方向:VANET安全与隐私。
  • 基金资助:
    “十二五”国家科技支撑计划项目(2015BAG13B01);江苏省前瞻性联合研究项目(BY2014038-03)。

Research progress in Internet of vehicles trajectory privacy protection

ZHANG Chunhua1, ZANG Haijuan2, XUE Xiaoping1, ZHANG Fang1, CHEN Kangqiang1, FENG Lijuan1   

  1. 1. College of Electronics and Information Engineering, Tongji University, Shanghai 201804, China;
    2. College of Computer Engineering, Jiangsu University of Technology, Changzhou Jiangsu 213001, China
  • Received:2017-01-24 Revised:2017-03-23 Online:2017-07-10 Published:2017-07-18
  • Supported by:
    This work is partially supported by the National Key Technology R&D Program during the Twelfth Five-year Plan Period (2015BAG13B01), the Prospective Joint Research Project of Jiangsu Province (BY2014038-03).

摘要: 轨迹隐私保护对车联网(IoV)的发展至关重要,归纳和分析现有研究方法有重要意义。车联网轨迹隐私保护思想有轨迹模糊、假名更换和轨迹加密等3类,实现方法分别有基于用户真实轨迹的方法和基于哑元轨迹的方法、基于混合区域的方法和基于路径混淆的方法、基于私密信息检索(PIR)协议的方法和基于空间转换的方法。首先,介绍和归纳了研究背景和常见攻击等车联网轨迹隐私保护关键问题;然后,从方法思想、科学问题、方法演进等方面详细综述了现有车联网轨迹隐私保护方法,并阐述了需深入研究的难题;在此基础上,总结了代表性方案的隐私保护度、抗攻击性、复杂度等性能指标;最后展望了车联网轨迹隐私保护的未来研究方向。

关键词: 车联网, 轨迹隐私, 隐私保护

Abstract: Trajectory privacy protection is critical to the development of Internet of Vehicles (IoV), which makes it important to summarize and analyze existing research methods. Existing IoV trajectory privacy protection methods can be divided into three categories: trajectory obfuscation, pseudonym change and trajectory encryption. Trajectory obfuscation can be achieved based on users' real trajectory or dummy trajectory. Pseudonym change can be achieved based on mix-zone or path confusion. Trajectory encryption can be achieved based on Private Information Retrieval (PIR) protocol or spatial transformation. Firstly, the research background and common attacks were introduced and summarized in this paper. Secondly, existing IoV trajectory privacy protection methods were surveyed from the aspects of methodology, scientific problem and method evolution. The problems need to be further studied also were elaborated. Furthermore, the performances of representative schemes were summarized, such as privacy protection, attack resistance and complexity. Finally, the future research directions of IoV trajectory privacy protection was prospected.

Key words: Internet of Vehicles (IoV), trajectory privacy, privacy protection

中图分类号: