%0 Journal Article %A CHEN Kangqiang %A FENG Lijuan %A XUE Xiaoping %A ZANG Haijuan %A ZHANG Chunhua %A ZHANG Fang %T Research progress in Internet of vehicles trajectory privacy protection %D 2017 %R 10.11772/j.issn.1001-9081.2017.07.1921 %J Journal of Computer Applications %P 1921-1925 %V 37 %N 7 %X Trajectory privacy protection is critical to the development of Internet of Vehicles (IoV), which makes it important to summarize and analyze existing research methods. Existing IoV trajectory privacy protection methods can be divided into three categories: trajectory obfuscation, pseudonym change and trajectory encryption. Trajectory obfuscation can be achieved based on users' real trajectory or dummy trajectory. Pseudonym change can be achieved based on mix-zone or path confusion. Trajectory encryption can be achieved based on Private Information Retrieval (PIR) protocol or spatial transformation. Firstly, the research background and common attacks were introduced and summarized in this paper. Secondly, existing IoV trajectory privacy protection methods were surveyed from the aspects of methodology, scientific problem and method evolution. The problems need to be further studied also were elaborated. Furthermore, the performances of representative schemes were summarized, such as privacy protection, attack resistance and complexity. Finally, the future research directions of IoV trajectory privacy protection was prospected. %U http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2017.07.1921