《计算机应用》唯一官方网站 ›› 2026, Vol. 46 ›› Issue (3): 809-820.DOI: 10.11772/j.issn.1001-9081.2025030352
何丽丽1,2, 管新如1,2, 张磊1,2(
), 蒋胜1,2, 蒋澄杰1,2
收稿日期:2025-04-07
修回日期:2025-05-16
接受日期:2025-05-19
发布日期:2025-05-29
出版日期:2026-03-10
通讯作者:
张磊
作者简介:何丽丽(1979—),女,黑龙江佳木斯人,教授,博士,CCF会员,主要研究方向:隐私保护、信息安全基金资助:
Lili HE1,2, Xinru GUAN1,2, Lei ZHANG1,2(
), Sheng JIANG1,2, Chengjie JIANG1,2
Received:2025-04-07
Revised:2025-05-16
Accepted:2025-05-19
Online:2025-05-29
Published:2026-03-10
Contact:
Lei ZHANG
About author:HE Lili, born in 1979, Ph. D., professor. Her research interests include privacy protection, information security.Supported by:摘要:
随着无线通信技术和高精度移动定位技术的发展,车联网(IoV)已深度融入人们的日常生活中。IoV在为人们带来便利的同时,也带来了隐私风险。通常,在IoV中,车辆行驶信息与其他车辆信息和基础设施信息进行实时交互。而在交互过程中,可能会产生敏感信息泄露等隐私问题。首先,对IoV的位置隐私架构和隐私风险进行介绍;其次,介绍差分隐私的动态分配噪声机制、多维度差分隐私轨迹保护及数据扰动技术;再次,对基于匿名化的空间泛化和K匿名以及加密机制的非对称加密、对称加密和同态加密进行介绍;最后,从差分隐私、匿名及加密机制的优缺点和局限性等方面加以分析与评价。
中图分类号:
何丽丽, 管新如, 张磊, 蒋胜, 蒋澄杰. 车联网位置隐私保护的全景与未来[J]. 计算机应用, 2026, 46(3): 809-820.
Lili HE, Xinru GUAN, Lei ZHANG, Sheng JIANG, Chengjie JIANG. Panorama and future of location privacy protection in internet of vehicles[J]. Journal of Computer Applications, 2026, 46(3): 809-820.
| 层次 | 攻击 | 攻击者 | 攻击方式 | 攻击影响 | 防护措施 |
|---|---|---|---|---|---|
| 网络层 | 窃听攻击[ | 黑客、情报机构 | 监听网络流量,窃取数据 | 用户隐私泄露 | 数据加密传输,采用HTTPS、TLS协议 |
| 流量分析[ | 数据分析者 | 监控数据,推测用户行为 | 行程跟踪、实时定位风险 | 流量混淆、加密 | |
| 伪装攻击[ | 窃听者 | 伪造合法设备 | 车辆误识别 | 设备认证、数字签名 | |
| 应用层 | 恶意软件[ | 网络犯罪团伙 | 远程植入恶意代码 | 车系统失控,数据泄露 | 签名验证、实时威胁防御 |
| 信息篡改[ | 内奸员工、第三方平台 | 篡改个人信息 | 非法修改车载传感器数据 | 数据敏感处理、访问控制策略 | |
| 重放攻击[ | 数据窃取者 | 数据合法后发送 | 干扰车系统易出现事故 | 时间戳验证、随机数生成 | |
| 感知层 | 消息篡改攻击[ | 网络攻击者 | 修改数据,车接收错误信息 | 车辆操作异常,数据误判 | 数据完整性校验 |
| 恶意操控[ | 黑客、远程攻击者 | 远程控制,导致误操作 | 影响驾驶安全 | 终端防护、身份验证 | |
| 交互攻击[ | 多设备攻击者 | 通过虚假节点操纵车交互 | 车系统瘫痪,数据失真 | 节点信任机制、多层防护 |
表1 车联网的隐私风险
Tab. 1 Privacy risks of internet of vehicles
| 层次 | 攻击 | 攻击者 | 攻击方式 | 攻击影响 | 防护措施 |
|---|---|---|---|---|---|
| 网络层 | 窃听攻击[ | 黑客、情报机构 | 监听网络流量,窃取数据 | 用户隐私泄露 | 数据加密传输,采用HTTPS、TLS协议 |
| 流量分析[ | 数据分析者 | 监控数据,推测用户行为 | 行程跟踪、实时定位风险 | 流量混淆、加密 | |
| 伪装攻击[ | 窃听者 | 伪造合法设备 | 车辆误识别 | 设备认证、数字签名 | |
| 应用层 | 恶意软件[ | 网络犯罪团伙 | 远程植入恶意代码 | 车系统失控,数据泄露 | 签名验证、实时威胁防御 |
| 信息篡改[ | 内奸员工、第三方平台 | 篡改个人信息 | 非法修改车载传感器数据 | 数据敏感处理、访问控制策略 | |
| 重放攻击[ | 数据窃取者 | 数据合法后发送 | 干扰车系统易出现事故 | 时间戳验证、随机数生成 | |
| 感知层 | 消息篡改攻击[ | 网络攻击者 | 修改数据,车接收错误信息 | 车辆操作异常,数据误判 | 数据完整性校验 |
| 恶意操控[ | 黑客、远程攻击者 | 远程控制,导致误操作 | 影响驾驶安全 | 终端防护、身份验证 | |
| 交互攻击[ | 多设备攻击者 | 通过虚假节点操纵车交互 | 车系统瘫痪,数据失真 | 节点信任机制、多层防护 |
| 方法类别 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
| 动态分配噪声 | 连续位置隐私保护[ | 基于道路关系,动态分配预算 | 拉普拉斯加噪,敏感路段保护 | 动态适配道路变化 | 依赖道路拓扑、降低数据精度 | 车辆连续位置保护 |
| 本地差分隐私保护[ | 自主添加噪声 | 拉普拉斯机制噪声扰动 | 用户自主控制隐私 | 全局噪声导致数据统计偏差 | 不可信数据收集场景 | |
多维度差分隐私 轨迹保护 | 差分隐私轨迹数据保护[ | 身份匿名对轨迹加噪 | 伪用户替代真实用户请求 | 抗关联攻击能力强 | 计算复杂度高 | 用户身份与轨迹保护 |
| 形状相似差分隐私轨迹保护[ | 相对熵计算,动态分配预算 | k-means聚类结合Fréchet | 抗形状推断攻击 | 计算复杂度高 | 轨迹形状隐私保护 | |
| 数据扰动技术 | 联邦学习增强扰动方案[ | 分布式存储与逐层管理扰动 | 拉普拉斯+联邦学习 | 支持分布式数据隐私保护 | 计算与通信开销大 | 车联网分布式数据处理 |
| 本地化差分隐私联邦学习[ | 参数端扰动后聚合 | 本地化加噪+中心服务器聚合 | 用户数据无需离开本地 | 须设计轻量化扰动机制 | 分布式模型训练隐私保护 |
表2 差分隐私保护技术的分类与特性对比
Tab. 2 Classification and feature comparison of differential privacy protection technologies
| 方法类别 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
| 动态分配噪声 | 连续位置隐私保护[ | 基于道路关系,动态分配预算 | 拉普拉斯加噪,敏感路段保护 | 动态适配道路变化 | 依赖道路拓扑、降低数据精度 | 车辆连续位置保护 |
| 本地差分隐私保护[ | 自主添加噪声 | 拉普拉斯机制噪声扰动 | 用户自主控制隐私 | 全局噪声导致数据统计偏差 | 不可信数据收集场景 | |
多维度差分隐私 轨迹保护 | 差分隐私轨迹数据保护[ | 身份匿名对轨迹加噪 | 伪用户替代真实用户请求 | 抗关联攻击能力强 | 计算复杂度高 | 用户身份与轨迹保护 |
| 形状相似差分隐私轨迹保护[ | 相对熵计算,动态分配预算 | k-means聚类结合Fréchet | 抗形状推断攻击 | 计算复杂度高 | 轨迹形状隐私保护 | |
| 数据扰动技术 | 联邦学习增强扰动方案[ | 分布式存储与逐层管理扰动 | 拉普拉斯+联邦学习 | 支持分布式数据隐私保护 | 计算与通信开销大 | 车联网分布式数据处理 |
| 本地化差分隐私联邦学习[ | 参数端扰动后聚合 | 本地化加噪+中心服务器聚合 | 用户数据无需离开本地 | 须设计轻量化扰动机制 | 分布式模型训练隐私保护 |
| 方法分类 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
空间 泛化 | 广播和沉默期匿名更改策略[ | 车辆在广播阶段发送消息,静默阶段停止发送并更换假名,结合历史轨迹数据确定频繁停靠位置 | 假名更换、静默期设计、RSU指示 | 动态匿名性强、减少位置关联风险 | 依赖RSU协调、静默期可能影响实时通信效率 | 车联网中车辆位置隐私保护 |
| 耦合隐私与安全的匿名化保护方法[ | 车辆进入新RSU覆盖范围时发送减少信标消息,结合真实身份和位置信息生成伪名 | 伪名生成、RSU维护车辆记录、验证消息真实性 | 抗伪造攻击、身份与位置双重保护 | 需维护大量车辆记录、密钥管理复杂 | 车联网中车辆位置隐私保护 | |
| K匿名 | 个性化差分隐私的K匿名轨迹隐私保护方案[ | 结合K匿名与差分隐私技术,生成2k条噪声轨迹,筛选最优k-1条与真实用户组成K匿名组 | K匿名、差分隐私、轨迹相似性度量 | 抗关联攻击能力强、双重隐私保护 | 计算复杂度高、需平衡匿名化与数据可用性 | 车联网中用户身份和轨迹隐私保护 |
| 基于Geohash和二进制编码的Casper模型[ | 结合Geohash编码前缀和二进制编码后缀,确保授权用户的位置隐私不被泄露 | Geohash编码、二进制编码、K匿名区域位置编码 | 编码增强安全性 | 实现复杂度高、需协调编码参数一致性 | 车联网中用户位置隐私保护 | |
| 基于虚拟查询序列的位置隐私和查询隐私联合保护方案[ | 构建k-1个虚拟查询与真实查询混合,建模位置隐私与查询隐私之间的语义关联 | 虚拟查询生成、欧几里得距离、关联规则算法 | 保护位置与查询双重隐私、抗语义关联攻击 | 虚拟查询生成开销大、依赖查询模式相似性 | 车联网中位置隐私和查询隐私联合保护 |
表3 匿名化隐私保护技术的分类与特性对比
Tab. 3 Classification and feature comparison of anonymized privacy protection technologies
| 方法分类 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
空间 泛化 | 广播和沉默期匿名更改策略[ | 车辆在广播阶段发送消息,静默阶段停止发送并更换假名,结合历史轨迹数据确定频繁停靠位置 | 假名更换、静默期设计、RSU指示 | 动态匿名性强、减少位置关联风险 | 依赖RSU协调、静默期可能影响实时通信效率 | 车联网中车辆位置隐私保护 |
| 耦合隐私与安全的匿名化保护方法[ | 车辆进入新RSU覆盖范围时发送减少信标消息,结合真实身份和位置信息生成伪名 | 伪名生成、RSU维护车辆记录、验证消息真实性 | 抗伪造攻击、身份与位置双重保护 | 需维护大量车辆记录、密钥管理复杂 | 车联网中车辆位置隐私保护 | |
| K匿名 | 个性化差分隐私的K匿名轨迹隐私保护方案[ | 结合K匿名与差分隐私技术,生成2k条噪声轨迹,筛选最优k-1条与真实用户组成K匿名组 | K匿名、差分隐私、轨迹相似性度量 | 抗关联攻击能力强、双重隐私保护 | 计算复杂度高、需平衡匿名化与数据可用性 | 车联网中用户身份和轨迹隐私保护 |
| 基于Geohash和二进制编码的Casper模型[ | 结合Geohash编码前缀和二进制编码后缀,确保授权用户的位置隐私不被泄露 | Geohash编码、二进制编码、K匿名区域位置编码 | 编码增强安全性 | 实现复杂度高、需协调编码参数一致性 | 车联网中用户位置隐私保护 | |
| 基于虚拟查询序列的位置隐私和查询隐私联合保护方案[ | 构建k-1个虚拟查询与真实查询混合,建模位置隐私与查询隐私之间的语义关联 | 虚拟查询生成、欧几里得距离、关联规则算法 | 保护位置与查询双重隐私、抗语义关联攻击 | 虚拟查询生成开销大、依赖查询模式相似性 | 车联网中位置隐私和查询隐私联合保护 |
| 方法分类 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
非对称 加密 | 基于身份基加密的高效认证方案[ | 车辆身份作为公钥,私钥生成器生成 | 身份基加密、伪身份生成、ZKP | 简化密钥管理,支持匿名认证 | 依赖可信私钥生成器,存在密钥风险 | 车对基础设施通信 |
| 基于双线性配对方案[ | 结合无证书密码学 | 双线性配对、匿名身份生成 | 保障机密性 | 数学运算复杂度高 | 异构车辆安全通信 | |
对称 加密 | 基于哈希轻量级认证协议[ | 利用哈希函数生成签名 | 变色龙哈希、布隆过滤器 | 降低计算与通信开销 | 依赖哈希函数安全性 | 车联网持续身份认证 |
| 基于地理区域对称方案[ | 划分安全区域 | 区域划分、密钥更新 | 车辆网络实时通信 | 计算效率高 | 密钥分发复杂 | |
同态 加密 | 基于Paillier的LBS方案[ | 允许在加密数据上计算 | 分布式存储 | 数据存储与共享 | 支持同态加密计算 | 计算资源消耗大 |
| 区块链与同态加密框架[ | 同态加密保护位置策略 | 保序加密 | 车联网空间众包服务 | 消除第三方依赖 | 通信开销大 |
表4 加密隐私保护技术的分类与特性对比
Tab. 4 Classification and feature comparison of encryption-based privacy protection technologies
| 方法分类 | 代表方法 | 核心原理 | 技术手段 | 优势 | 局限性 | 应用场景 |
|---|---|---|---|---|---|---|
非对称 加密 | 基于身份基加密的高效认证方案[ | 车辆身份作为公钥,私钥生成器生成 | 身份基加密、伪身份生成、ZKP | 简化密钥管理,支持匿名认证 | 依赖可信私钥生成器,存在密钥风险 | 车对基础设施通信 |
| 基于双线性配对方案[ | 结合无证书密码学 | 双线性配对、匿名身份生成 | 保障机密性 | 数学运算复杂度高 | 异构车辆安全通信 | |
对称 加密 | 基于哈希轻量级认证协议[ | 利用哈希函数生成签名 | 变色龙哈希、布隆过滤器 | 降低计算与通信开销 | 依赖哈希函数安全性 | 车联网持续身份认证 |
| 基于地理区域对称方案[ | 划分安全区域 | 区域划分、密钥更新 | 车辆网络实时通信 | 计算效率高 | 密钥分发复杂 | |
同态 加密 | 基于Paillier的LBS方案[ | 允许在加密数据上计算 | 分布式存储 | 数据存储与共享 | 支持同态加密计算 | 计算资源消耗大 |
| 区块链与同态加密框架[ | 同态加密保护位置策略 | 保序加密 | 车联网空间众包服务 | 消除第三方依赖 | 通信开销大 |
| [1] | 唐晓岚,梁煜婷,陈文龙. 面向非独立同分布数据的车联网多阶段联邦学习机制[J]. 计算机研究与发展, 2024, 61(9): 2170-2184. |
| TANG X L, LIANG Y T, CHEN W L. Multi-stage federated learning mechanism with non-IID data in Internet of Vehicles [J]. Journal of Computer Research and Development, 2024, 61(9): 2170-2184. | |
| [2] | 高胜,陈秀华,朱建明,等. 基于区块链的群智感知中任务预算约束的位置隐私保护参与者选择方法[J]. 计算机学报, 2022, 45(5): 1052-1067. |
| GAO S, CHEN X H, ZHU J M, et al. A location privacy-preserving worker selection scheme under limited budget for blockchain-based crowdsensing [J]. Chinese Journal of Computers, 2022, 45(5): 1052-1067. | |
| [3] | XU C, DING Y, CHEN C, et al. Personalized location privacy protection for location-based services in vehicular networks [J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(1): 1163-1177. |
| [4] | 王涛春,刘盈,金鑫,等. 群智感知中基于k-匿名的位置及数据隐私保护方法研究[J]. 通信学报, 2018, 39(S1): 170-178. |
| WANG T C, LIU Y, JIN X, et al. Research on k-anonymity-based privacy protection in crowd sensing [J]. Journal on Communications, 2018, 39(S1): 170-178. | |
| [5] | GAO H, HUANG W, LIU T, et al. PPO2: location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems [J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(7): 7599-7612. |
| [6] | 范艳芳,张哲,秦天琦,等. 基于区块链的车联网数据共享综述[J]. 计算机应用研究, 2025, 42(6): 1611-1623. |
| FAN Y F, ZHANG Z, QIN T Q, et al. Review of blockchain-based data sharing in Internet of Vehicles [J]. Application Research of Computers, 2025, 42(6): 1611-1623. | |
| [7] | KHAZBAK Y, FAN J, ZHU S, et al. Preserving location privacy in ride-hailing service [C]// Proceedings of the 2018 IEEE Conference on Communications and Network Security. Piscataway: IEEE, 2018: 1-9. |
| [8] | KIM J W, EDEMACU K, JANG B. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: a survey [J]. Journal of Network and Computer Applications, 2022, 200: No.103315. |
| [9] | ZHAO Y, YUAN D, DU J T, et al. Geo-ellipse-indistinguishability: community-aware location privacy protection for directional distribution [J]. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(7): 6957-6967. |
| [10] | YANG Q, LI D, AN D, et al. Towards incentive for electrical vehicles demand response with location privacy guaranteeing in microgrids [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 131-145. |
| [11] | TANG J, ZHU H, LU R, et al. DLP: achieve customizable location privacy with deceptive dummy techniques in LBS applications [J]. IEEE Internet of Things Journal, 2022, 9(9): 6969-6984. |
| [12] | 钟小宇,李梦涵,李丽红. 车联网位置隐私保护研究综述[J]. 物联网技术, 2023, 13(3): 77-79. |
| ZHONG X Y, LI M H, LI L H. A survey on location privacy protection in Internet of Vehicles[J]. Internet of Things Technologies, 2023, 13(3): 77-79. | |
| [13] | 何业锋,刘闪闪,刘妍,等. 支持虚拟车辆辅助假名更新的混合区位置隐私保护方案[J]. 计算机应用研究, 2024, 41(1): 273-276. |
| HE Y F, LIU S S, LIU Y, et al. Mix zone location privacy protection scheme supporting virtual vehicle assisted pseudonym changes [J]. Application Research of Computers, 2024, 41(1): 273-276. | |
| [14] | 赵国锋,吴昊,王杉杉,等. 车联网POI查询中的位置隐私和查询隐私联合保护机制[J]. 电子与信息学报, 2024, 46(1): 155-164. |
| ZHAO G F, WU H, WANG S S, et al. A location privacy and query privacy joint protection scheme for POI query in vehicular networks [J]. Journal of Electronics and Information Technology, 2024, 46(1): 155-164. | |
| [15] | WANG C, WANG D, XU G, et al. Efficient privacy-preserving user authentication scheme with forward secrecy for Industry 4.0[J]. SCIENCE CHINA Information Sciences, 2021, 65(1): No.112301. |
| [16] | GAZDAG A, LESTYÁN S, REMELI M, et al. Privacy pitfalls of releasing in-vehicle network data [J]. Vehicular Communications, 2023, 39: No.100565. |
| [17] | LI M, ZHU L, ZHANG Z, et al. User-defined privacy-preserving traffic monitoring against n-by-1 jamming attack [J]. IEEE/ACM Transactions on Networking, 2022, 30(5): 2060-2073. |
| [18] | CAI Y, ZHANG H, FANG Y, et al. A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks [J]. IEEE Internet of Things Journal, 2021, 8(1): 647-656. |
| [19] | GHANE S, JOLFAEI A, KULIK L, et al. Preserving privacy in the internet of connected vehicles [J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(8): 5018-5027. |
| [20] | CUI J, XU W, HAN Y, et al. Secure mutual authentication with privacy preservation in vehicular Ad Hoc networks [J]. Vehicular Communications, 2020, 21: No.100200. |
| [21] | SUTRALA A K, BAGGA P, DAS A K, et al. On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment [J]. IEEE Transactions on Vehicular Technology, 2020, 69(5): 5535-5548. |
| [22] | COMINELLI M, KOSTERHON F, GRINGOLI F, et al. An experimental study of CSI management to preserve location privacy[C]// Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization. New York: ACM, 2020: 64-71. |
| [23] | ZHANG G, ZHANG A, ZHAO P, et al. LocMIA: membership inference attacks against aggregated location data [J]. IEEE Internet of Things Journal, 2020, 7(12): 11778-11788. |
| [24] | SUI W, LIU Z, LV H, et al. Random partition region for location privacy protection on edge computing [C]// Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing/ 7th IEEE International Conference on Edge Computing and Scalable Cloud. Piscataway: IEEE, 2021: 155-160. |
| [25] | ATMACA U I, MAPLE C, EPIPHANIOU G, et al. A privacy-preserving route planning scheme for the Internet of Vehicles [J]. Ad Hoc Networks, 2021, 123: No.102680. |
| [26] | 李洪涛,任晓宇,王洁,等. 基于差分隐私的连续位置隐私保护机制[J]. 通信学报, 2021, 42(8): 164-175. |
| LI H T, REN X Y, WANG J, et al. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. | |
| [27] | 宋成,程道晨,倪水平,等. 个性化差分隐私的k匿名轨迹隐私保护方案[J]. 北京邮电大学学报, 2023, 46(3): 109-114. |
| SONG C, CHENG D C, NI S P, et al. k Anonymous trajectory privacy protection scheme of personalized differential privacy [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 109-114. | |
| [28] | ERROUNDA F Z, LIU Y. Collective location statistics release with local differential privacy [J]. Future Generation Computer Systems, 2021, 124: 174-186. |
| [29] | KUANG L, WANG Y, ZHENG X, et al. Using location semantics to realize personalized road network location privacy protection[J]. EURASIP Journal on Wireless Communications and Networking, 2020, 2020: No.1. |
| [30] | ARIF M, CHEN J, WANG G, et al. Privacy preserving and data publication for vehicular trajectories with differential privacy [J]. Measurement, 2021, 173: No.108675. |
| [31] | 张朋飞,朱伊波,程祥,等. 基于自适应剪枝的满足本地差分隐私的真值发现算法[J]. 软件学报, 2025, 36(7): 3405-3428. |
| ZHANG P F, ZHU Y B, CHENG X, et al. Locally differentially private truth discovery algorithm via adaptive pruning [J]. Journal of Software, 2025, 36(7): 3405-3428. | |
| [32] | 徐川,丁颖祎,罗丽,等. 车联网中基于位置服务的个性化位置隐私保护[J]. 软件学报, 2022, 33(2): 699-716. |
| XU C, DING Y Y, LUO L, et al. Personalized location privacy protection for location-based services in vehicular networks [J]. Journal of Software, 2022, 33(2): 699-716. | |
| [33] | 邓蔚,陈秀婷,张清华,等. 基于树模型的差分隐私保护算法[J]. 重庆邮电大学学报(自然科学版), 2020, 32(5): 848-856. |
| DENG W, CHEN X T, ZHANG Q H, et al. Differential privacy protection algorithms based on tree model [J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2020, 32(5): 848-856. | |
| [34] | 宋成,许标,贺军义. 差分隐私轨迹数据保护方案[J]. 北京邮电大学学报, 2022, 45(1): 13-18. |
| SONG C, XU B, HE J Y. Differential privacy trajectory data protection scheme [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 13-18. | |
| [35] | 朱维军,游庆光,杨卫东,等. 基于统计差分的轨迹隐私保护[J]. 计算机研究与发展, 2017, 54(12): 2825-2832. |
| ZHU W J, YOU Q G, YANG W D, et al. Trajectory privacy protection based on statistical differential privacy [J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. | |
| [36] | 朱素霞,刘抒伦,孙广路. 基于相对熵和K-means的形状相似差分隐私轨迹保护机制[J]. 通信学报, 2021, 42(2): 113-123. |
| ZHU S X, LIU S L, SUN G L. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. | |
| [37] | CAO W, XU X. Differentially private data publishing of trajectory synthesis based on generalization and probability [J]. Journal of Shanghai Jiaotong University (Science), 2024(Early Access): 1-15. |
| [38] | 刘沛骞,贾庆林,王辉,等. 基于用户相关性的差分隐私轨迹隐私保护方案[J]. 计算机应用研究, 2024, 41(7): 2189-2194. |
| LIU P Q, JIA Q L, WANG H, et al. Differential privacy trajectory privacy protection scheme based on user correlation [J]. Application Research of Computers, 2024, 41(7): 2189-2194. | |
| [39] | TIAN R, GAO P, LIU Y. A privacy-preserving vehicle trajectory clustering framework [J]. Frontiers of Information Technology and Electronic Engineering, 2024, 25(7): 988-1002. |
| [40] | 叶阿勇,孟玲玉,赵子文,等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020, 41(4): 123-133. |
| YE A Y, MENG L Y, ZHAO Z W, et al. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. | |
| [41] | 焦荟聪,刘文菊,王赜. 基于指数机制的轨迹差分隐私保护方法[J]. 大数据, 2023, 9(1): 141-152. |
| JIAO H C, LIU W J, WANG Z. Trajectory differential privacy protection method based on exponential mechanism [J]. Big Data Research, 2023, 9(1): 141-152. | |
| [42] | 潘洪志. 满足差分隐私的位置轨迹流量发布方法[J]. 无线互联科技, 2023, 20(17): 22-26. |
| PAN H Z. Traffic publishing method of location trajectories satisfying differential privacy [J]. Wireless Internet Science and Technology, 2023, 20(17): 22-26. | |
| [43] | 王辉,陈宇,申自浩,等. 结合对比监督和排序树的轨迹数据差分隐私保护方案[J]. 计算机工程与科学, 2023, 45(10): 1797-1805. |
| WANG H, CHEN Y, SHEN Z H, et al. A trajectory data differential privacy protection scheme that combines contrast supervision and sorting tree [J]. Computer Engineering and Science, 2023, 45(10): 1797-1805. | |
| [44] | 邬忠萍,郝宗波,王文静,等. 结合联邦学习和增强学习的车联网数据差分隐私保护[J]. 汽车技术, 2023(11): 56-62. |
| WU Z P, HAO Z B, WANG W J, et al. Differential privacy protection for Internet of Vehicles by combining federated learning and reinforcement learning [J]. Automobile Technology, 2023(11): 56-62. | |
| [45] | KSERAWI F, AL-MARRI S, MALLUHI Q, et al. Privacy-preserving fog aggregation of smart grid data using dynamic differentially-private data perturbation [J]. IEEE Access, 2022, 10: 43159-43174. |
| [46] | 付钰,俞艺涵,吴晓平. 大数据环境下差分隐私保护技术及应用[J]. 通信学报, 2019, 40(10): 157-168. |
| FU Y, YU Y H, WU X P. Differential privacy protection technology and its applications in big data environment [J]. Journal on Communications, 2019, 40(10): 157-168. | |
| [47] | MIN M, ZHU H, DING J, et al. Personalized 3D location privacy protection with differential and distortion geo-perturbation [J]. IEEE Transactions on Dependable and Secure Computing, 2023, 21(4): 3629-3643. |
| [48] | 康海燕,冀源蕊. 基于本地化差分隐私的联邦学习方法研究[J]. 通信学报, 2022, 43(10): 94-105. |
| KANG H Y, JI Y R. Research on federated learning method based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. | |
| [49] | FATHI K, CORRADINI F, SADURSKI M, et al. Domain adaptation via simulation parameter and data perturbation for predictive maintenance [C]// Proceedings of the 8th European Conference of the Prognostics and Health Management Society. State College, PA: PHM Society, 2024, 8(1): 389-399. |
| [50] | 陈思,付安民,苏铓,等. 基于差分隐私的轨迹隐私保护方案[J]. 通信学报, 2021, 42(9): 54-64. |
| CHEN S, FU A M, SU M, et al. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. | |
| [51] | 刘振鹏,苗德威,刘倩楠,等. k-匿名下通过本地差分隐私实现位置隐私保护[J]. 计算机应用研究, 2022, 39(8): 2469-2473. |
| LIU Z P, MIAO D W, LIU Q N, et al. Location privacy protection via local differential privacy under k-anonymity [J]. Application Research of Computers, 2022, 39(8): 2469-2473. | |
| [52] | YE Q, HU H, LI N, et al. Beyond value perturbation: local differential privacy in the temporal setting [C]// Proceedings of the 2021 IEEE Conference on Computer Communications. Piscataway: IEEE, 2021: 1-10. |
| [53] | 沈勇,徐海栋. 基于移动计算的车联网位置隐私问题探究[J]. 计算机与数字工程, 2022, 50(5): 1023-1028. |
| SHEN Y, XU H D. Research on local privacy of internet of vehicles based on mobile computing [J]. Computer and Digital Engineering, 2022, 50(5): 1023-1028. | |
| [54] | LI H, LAI Y, CHEN Y, et al. Broadcast and Silence Period (BSP): a pseudonym change strategy [J]. IEEE Transactions on Vehicular Technology, 2023, 72(10): 13618-13630. |
| [55] | BENAROUS L, BITAM S, MELLOUK A, et al. CSLPPS: concerted silence-based location privacy preserving scheme for internet of vehicles [J]. IEEE Transactions on Vehicular Technology, 2021, 70(7): 7153-7160. |
| [56] | WAHID A, YASMEEN H, SHAH M A, et al. Holistic approach for coupling privacy with safety in VANETs [J]. Computer Networks, 2019, 148: 214-230. |
| [57] | MDEE A P, KHAN M T R, SEO J, et al. Security compliant and cooperative pseudonyms swapping for location privacy preservation in VANETs [J]. IEEE Transactions on Vehicular Technology, 2023, 72(8): 10710-10723. |
| [58] | ZHANG Z, FENG T, WONG W C, et al. A geo-indistinguishable context-based mix strategy for trajectory protection in VANETs[J]. IEEE Transactions on Vehicular Technology, 2023, 72(12): 16538-16552. |
| [59] | 门红蕾,曹利,郑国莉,等. 车联网基于稀疏用户环境的LBS隐私保护方案[J]. 计算机应用研究, 2024, 41(9): 2831-2838. |
| MEN H L, CAO L, ZHENG G L, et al. LBS privacy protection scheme based on sparse user environment of VANET [J]. Application Research of Computers, 2024, 41(9): 2831-2838. | |
| [60] | 韩牟,杨晨,华蕾,等. 面向移动边缘计算车联网中车辆假名管理方案[J]. 计算机研究与发展, 2022, 59(4): 781-795. |
| HAN M, YANG C, HUA L, et al. Vehicle pseudonym management scheme in internet of vehicles for mobile edge computing [J]. Journal of Computer Research and Development, 2022, 59(4): 781-795. | |
| [61] | SINGH P K, GOWTHAM S N, TAMILSELVAN S, et al. CPESP: cooperative pseudonym exchange and scheme permutation to preserve location privacy in VANETs [J]. Vehicular Communications, 2019, 20: No.100183. |
| [62] | 侯慧莹,廉欢欢,赵运磊. 面向自动驾驶的高效可追踪的车联网匿名通信方案[J]. 计算机研究与发展, 2022, 59(4): 894-906. |
| HOU H Y, LIAN H H, ZHAO Y L. An efficient and traceable anonymous VANET communication scheme for autonomous driving [J]. Journal of Computer Research and Development, 2022, 59(4): 894-906. | |
| [63] | JIA X, XING L, GAO J, et al. A survey of location privacy preservation in social internet of vehicles [J]. IEEE Access, 2020, 8: 201966-201984. |
| [64] | RAVI N, KRISHNA C M, KOREN I. Enhancing vehicular anonymity in ITS: a new scheme for mix zones and their placement[J]. IEEE Transactions on Vehicular Technology, 2019, 68(11): 10372-10381. |
| [65] | ZHONG H, NI J, CUI J, et al. Personalized location privacy protection based on vehicle movement regularity in vehicular networks [J]. IEEE Systems Journal, 2022, 16(1): 755-766. |
| [66] | AlMARSHOUD M S, AL-BAYATTI A H, KIRAZ M S. Location privacy in VANETs: provably secure anonymous key exchange protocol based on self-blindable signatures [J]. Vehicular Communications, 2022, 36: No.100490. |
| [67] | CHENG T, LIU Q, SHI Q, et al. Efficient anonymous authentication and group key distribution scheme based on quantum random numbers for VANETs [J]. IEEE Internet of Things Journal, 2024, 11(13): 23544-23560. |
| [68] | 崔杰,陈学峰,张静,等. 基于公交车缓存的车联网位置隐私保护方案[J]. 通信学报, 2021, 42(7): 150-161. |
| CUI J, CHEN X F, ZHANG J, et al. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. | |
| [69] | 李勇军,祝跃飞,白利芳. 基于Geohash的增强型位置k-匿名隐私保护方案[J]. 计算机科学, 2024, 51(9): 393-400. |
| LI Y J, ZHU Y F, BAI L F. Enhanced location k-anonymity privacy protection scheme based on Geohash [J]. Computer Science, 2024, 51(9): 393-400. | |
| [70] | 冯景瑜,杨锦雯,张瑞通,等. 抗位置隐私泄露的物联网频谱共享激励机制[J]. 计算机研究与发展, 2020, 57(10): 2209-2220. |
| FENG J Y, YANG J W, ZHANG R T, et al. A spectrum sharing incentive scheme against location privacy leakage in IoT networks [J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. | |
| [71] | WU H, ZHAO G, WANG S, et al. A location privacy and query privacy joint protection scheme for POI query in vehicular networks[C]// Proceedings of the 2023 IEEE International Conference on Communications. Piscataway: IEEE, 2023: 2294-2299. |
| [72] | XING L, JIA X, GAO J, et al. A location privacy protection algorithm based on double K-anonymity in the social internet of vehicles [J]. IEEE Communications Letters, 2021, 25(10): 3199-3203. |
| [73] | NIU B, CHEN Y, WANG Z, et al. Eclipse: preserving differential location privacy against long-term observation attacks[J]. IEEE Transactions on Mobile Computing, 2022, 21(1): 125-138. |
| [74] | LUO B, LI X, WENG J, et al. Blockchain enabled trust-based location privacy protection scheme in VANET [J]. IEEE Transactions on Vehicular Technology, 2020, 69(2): 2034-2048. |
| [75] | LI M, CHEN Y, ZHENG S, et al. Privacy-preserving navigation supporting similar queries in vehicular networks [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2):1133-1148. |
| [76] | XI N, LI W, JING L, et al. ZAMA: a ZKP-based anonymous mutual authentication scheme for the IoV [J]. IEEE Internet of Things Journal, 2022, 9(22): 22903-22913. |
| [77] | ALI I, LI F. An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs [J]. Vehicular Communications, 2020, 22: No.100228. |
| [78] | ELKHALIL A, ZHANG J, ELHABOB R, et al. An efficient signcryption of heterogeneous systems for internet of vehicles [J]. Journal of Systems Architecture, 2020, 113: No.101885. |
| [79] | ALI I, LAWRENCE T, OMALA A A, et al. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs [J]. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11266-11280. |
| [80] | ALI I, CHEN Y, ULLAH N, et al. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2021, 70(6): 5974-5989. |
| [81] | ZHANG X, ZHONG H, CUI J, et al. LBVP: a lightweight batch verification protocol for fog-based vehicular networks using self-certified public key cryptography [J]. IEEE Transactions on Vehicular Technology, 2022, 71(5): 5519-5533. |
| [82] | THUMBUR G, RAO G S, REDDY P V, et al. Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks [J]. IEEE Internet of Things Journal, 2021, 8(3): 1908-1920. |
| [83] | BAGGA P, DAS A K, WAZID M, et al. On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system [J]. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1736-1751. |
| [84] | TANGADE S, MANVI S S, LORENZ P. Trust management scheme based on hybrid cryptography for secure communications in VANETs [J]. IEEE Transactions on Vehicular Technology, 2020, 69(5): 5232-5243. |
| [85] | 刘召曼,杨亚芳,宁建廷,等. 基于新型可净化多重签名的车联网高效假名证书分发方案[J]. 通信学报, 2024, 45(11): 27-45. |
| LIU Z M, YANG Y F, NING J T, et al. Efficient pseudonym certificate distribution scheme for Internet of Vehicles based on novel sanitizable multi-signature [J]. Journal on Communications, 2024, 45(11): 27-45. | |
| [86] | YADAV V K, VERMA S, VENKATESAN S, et al. Efficient and secure location-based services scheme in VANET [J]. IEEE Transactions on Vehicular Technology, 2020, 69(11): 13567-13578. |
| [87] | PAN H, WANG Y, WANG W, et al. Privacy-preserving location authentication for low-altitude UAVs: a blockchain-based approach[J]. Security and Safety, 2024, 3: No.2024004. |
| [88] | 邹光南,尤启迪,金星虎,等. 面向车联网车辆的轻量级持续身份认证协议[J]. 电子学报, 2024, 52(6): 1903-1910. |
| ZOU G N, YOU Q D, JIN X H, et al. Lightweight continuous authentication protocol for vehicles in vehicular networks [J]. Acta Electronica Sinica, 2024, 52(6): 1903-1910. | |
| [89] | GALLEGO-MADRID J, SANCHEZ-IBORRA R, SANTA J, et al. Evaluation of a zone encryption scheme for vehicular networks [J]. Computer Networks, 2020, 182: No.107523. |
| [90] | ZHANG J, SU S, ZHONG H, et al. Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs [J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 4830-4842. |
| [91] | SAMRA B, FOUZI S. New efficient certificateless scheme-based conditional privacy preservation authentication for applications in VANET[J]. Vehicular Communications, 2022, 34: No.100414. |
| [92] | 王瑞锦,唐榆程,张巍琦,等. 基于同态加密和区块链技术的车联网隐私保护方案[J]. 网络与信息安全学报, 2020, 6(1): 46-53. |
| WANG R J, TANG Y C, ZHANG W Q, et al. Privacy protection scheme for Internet of Vehicles based on homomorphic encryption and block chain technology [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 46-53. | |
| [93] | ZHANG J, YANG F, MA Z, et al. A decentralized location privacy-preserving spatial crowdsourcing for internet of vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(4): 2299-2313. |
| [94] | LI X, LIU J, OBAIDAT M S, et al. An unlinkable authenticated key agreement with collusion resistant for VANETs [J]. IEEE Transactions on Vehicular Technology, 2021, 70(8): 7992-8006. |
| [95] | KARIM H, RAWAT D B. TollsOnly please — homomorphic encryption for toll transponder privacy in Internet of Vehicles [J]. IEEE Internet of Things Journal, 2022, 9(4): 2627-2636. |
| [96] | YANG W, WANG S, CUI H, et al. A review of homomorphic encryption for privacy-preserving biometrics [J]. Sensors, 2023, 23(7): No.3566. |
| [97] | KIM S, KIM J, KIM M J, et al. BTS: an accelerator for bootstrappable fully homomorphic encryption [C]// Proceedings of the 49th Annual International Symposium on Computer Architecture. New York: ACM, 2022: 711-725. |
| [98] | MARCOLLA C, SUCASAS V, MANZANO M, et al. Survey on fully homomorphic encryption, theory, and applications [J]. Proceedings of the IEEE, 2022, 110(10): 1572-1609. |
| [1] | 樊娜, 罗闯, 张泽晖, 张梦瑶, 穆鼎. 基于改进生成对抗网络的车辆轨迹语义隐私保护机制[J]. 《计算机应用》唯一官方网站, 2026, 46(1): 169-180. |
| [2] | 翟社平, 朱鹏举, 杨锐, 刘佳一腾. 基于区块链的物联网身份管理系统[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2873-2881. |
| [3] | 张博瀚, 吕乐, 荆军昌, 刘栋. 基于遗传算法的属性网络社区隐藏方法[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2817-2826. |
| [4] | 晏燕, 李飞飞, 吕雅琴, 冯涛. 安全高效的混洗差分隐私频率估计方法[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2600-2611. |
| [5] | 苏锦涛, 葛丽娜, 肖礼广, 邹经, 王哲. 联邦学习中针对后门攻击的检测与防御方案[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2399-2408. |
| [6] | 葛丽娜, 王明禹, 田蕾. 联邦学习的高效性研究综述[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2387-2398. |
| [7] | 徐越端, 陈建伟, 朱恒亮. 基于无证书群签名的车联网条件隐私保护认证方案[J]. 《计算机应用》唯一官方网站, 2025, 45(5): 1556-1563. |
| [8] | 高改梅, 杜苗莲, 刘春霞, 杨玉丽, 党伟超, 邸国霞. 基于SM2可链接环签名的联盟链隐私保护方法[J]. 《计算机应用》唯一官方网站, 2025, 45(5): 1564-1572. |
| [9] | 李强, 白少雄, 熊源, 袁薇. 基于视觉大模型隐私保护的监控图像定位[J]. 《计算机应用》唯一官方网站, 2025, 45(3): 832-839. |
| [10] | 王宝银, 薛红梅, 刘期烈, 郭涛. 基于隐私保护的随机共识资产跨链方案[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 497-505. |
| [11] | 徐超, 张淑芬, 陈海田, 彭璐璐, 张帅华. 基于自适应差分隐私与客户选择优化的联邦学习方法[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 482-489. |
| [12] | 陈海田, 陈学斌, 马锐奎, 张帅华. 面向遥感数据的基于本地差分隐私的联邦学习隐私保护方案[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 506-517. |
| [13] | 罗欣洋, 万武南, 张仕斌, 张金全. 基于区块链和多属性决策的车联网信任管理方案[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3470-3476. |
| [14] | 孙碧芒, 万武南, 张仕斌, 张金全. 基于SM2同态加密的区块链多域访问控制方案[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3432-3439. |
| [15] | 云健, 高新茹, 刘涛, 毕文洁. 兼顾高效性和安全性的新型联邦学习方案[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3510-3518. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||