首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Location-based services(LBS)in vehic-ular ad hoc networks(VANETs)must protect users'privacy and address the threat of the exposure of sen-sitive locations durin...  相似文献   

2.
Zheng  Xiaodong  Yuan  Qi  Wang  Bo  Zhang  Lei 《Wireless Personal Communications》2022,126(1):719-740
Wireless Personal Communications - In the process of crowdsensing, tasks allocation is an important part of the precise as well as the quality of feedback results. However, during this process, the...  相似文献   

3.
Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet.In order to solve the problem of quality of location sharing while keeping privacy preserved,adaptive privacy preserved location sharing scheme called APPLSS is proposed,which is based on a new hierarchical ciphertext-policy attribute-based encryption algorithm.In the algorithm,attribute authority sets the attribute vector according to the attribute tags of registration from the location service providers.Then the attribute vector can be adaptively transformed into an access structure to control the encryption and decryption.The APPLSS offers a natural hierarchical mechanism in protecting location information when partially sharing it in mobile networks.It allows service providers access to end user’s sensitive location more flexibly,and satisfies a sufficient-but-no-more strategy.For end-users,the quality of service is obtained while no extra location privacy is leaked.To improve service response performance,outsourced decryption is deployed to avoid the bottlenecks of the service providers and location information providers.The performance analysis and experiments show that APPLSS is an efficient and practical location sharing scheme.  相似文献   

4.
The move towards service-oriented architectures and the increasing usage of mobile devices to access such services are two of the major changes in modern computing. Information about the user, their location and their trajectory can provide additional context information to a service, leading to useful applications such as directing a user to the nearest bus stop and displaying which buses are due to arrive in the next minutes. While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like location-based marketing or user behaviour profiling. Users can limit their location information provided to a service but these controls are simple, making it important for the user to understand how their location information is being used by services. This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory path of a user using Privacy-Enhancing Technologies.  相似文献   

5.

In recent years, Vehicular ad hoc networks (VANETs) could facilitate the decision-making progress of the drivers for example trip planning with the consideration of traffic. In the VANET, the Sybil attack is a very serious attack that collapses the security. In literature, some of the methods are reviewed to detect Sybil attacks in VANETs, but it fails to achieve Sybil attack detection. Hence, in this paper, Emperor Penguin Optimization-based Routing protocol (EPORP) is developed for detecting the Sybil attack which enhances the VANETs security. The main motive of the research is detecting the Sybil attack in VANETs for enhancing the secure operation. In the proposed approach, the Sybil attack will be detected with the help of the Rumour riding technique. To enhance the security of the VANETs, the Split XOR (SXOR) operation is utilized. In the SXOR operation, the optimal key is selected with the help of Emperor Penguin Optimization (EPO). The proposed method is implemented in the NS2 platform and performances are evaluated by metrics such as delay, throughput, delay, encryption time, and decryption time. The proposed method is compared with existing methods such as Whale Optimization Algorithm (WOA), Particle Swarm Optimization (PSO), and Firefly Algorithm (FA) respectively. While analyzing the delivery ratio, the proposed method has 0.96 s, and the WOA, PSO, and FA are 0.94, 0.92, and 0.90 respectively. From the analysis, the proposed method has a high delivery ratio value compared with the WOA, PSO, and FA methods. Similarly, the other parameters are analyzed and compared with the existing methods.

  相似文献   

6.
Patient telemonitoring systems (PTS) deal with the acquisition, processing, and secure transmission of a patient's physiological and physical parameters to a remote location, where expert medical knowledge is available. In emergency situations, when the patient's life is threatened, the trend in modern PTS is to transmit the current location of the patient. Although research in communications security has led to mechanisms that sufficiently protect medical data, research related to location privacy area is still in its early stages. This paper proposes an architecture that enhances PTS through location privacy and data encryption. We study the most popular PTS technologies in conjunction with location privacy architectures and propose an innovative scheme that exploits a point-to-point protocol called Mist. We describe a prototype implementation, developed for validating the proposed framework along with the corresponding evaluation results.   相似文献   

7.
随着3G技术的深入发展,人们对服务提出了更高的要求,在合法用户获取相应服务的同时,还要保护好用户的隐私。论文主要目的是解决3G用户的位置隐私问题,通过使用一个授权的匿名身份来替代3G中用到的IMSI和TMSI,防止了用户身份和位置信息的暴露。文章采用盲签名来实现身份的隐藏,从而达到了保护位置信息的目的。匿名身份的独立性和基于应用层实现该协议达到了用户对位置隐私的完全控制。  相似文献   

8.
AMOEBA: Robust Location Privacy Scheme for VANET   总被引:2,自引:0,他引:2  
Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can also lead to threats on location privacy of vehicle user. In this paper, we address the problem of mitigating unauthorized tracking of vehicles based on their broadcast communications, to enhance the user location privacy in VANET. Compared to other mobile networks, VANET exhibits unique characteristics in terms of vehicular mobility constraints, application requirements such as a safety message broadcast period, and vehicular network connectivity. Based on the observed characteristics, we propose a scheme called AMOEBA, that provides location privacy by utilizing the group navigation of vehicles. By simulating vehicular mobility in freeways and streets, the performance of the proposed scheme is evaluated under VANET application constraints and two passive adversary models. We make use of vehicular groups for anonymous access to location based service applications in VANET, for user privacy protection. The robustness of the user privacy provided is considered under various attacks.  相似文献   

9.
A location-aware service on a vehicular ad hoc networks (VANETs) is to provide services that distribute on-demand information for a certain geographic area of interest by taking advantage of vehicular communications. In this paper, we propose a secure and location assurance protocol in order to guarantee privacy preservation in vehicular communications and trustworthiness of location-aware services over VANETs. The proposed protocol enables a message verifier to have confidence that the location-aware information was responded from the vehicles passing through the target location area of interest without violating location privacy of the responders. To achieve our security objectives, we consider a pseudonym-based privacy-preserving authentication and a hierarchical identity-based cryptographic scheme. Furthermore, we demonstrate experimental results to confirm the efficiency and effectiveness of the proposed protocol.  相似文献   

10.
随机相位编码光学图像加密研究进展   总被引:1,自引:0,他引:1  
针对随机相位编码光学图像加密技术,简要回顾了它的国内外研究进展,并讨论了它的发展态势.  相似文献   

11.
In this paper, we propose a delay-tolerant secure long-term health care scheme, RCare, for collecting patient’s sensitive personal health information (PHI). Specifically, to minimize the overall health care cost, RCare provides network connectivity to rural areas using conventional transportation vehicles (e.g., cars, buses) as relay nodes. These vehicles are expected to store, carry, and forward the PHI to the health-service-provider located mostly at the city area following an opportunistic routing. RCare improves network performance by providing incentive to the cooperative vehicles, and encompasses identity based cryptography to ensure security and privacy of the PHI during the routing period by using short digital signature and pseudo-identity. Network fairness and resistance to different possible attacks are also ensured by RCare. Extensive security and performance analyses demonstrate that RCare is able to achieve desired security requirements with effectiveness in terms of high delivery ratio with acceptable communication delay.  相似文献   

12.
13.
Wireless Personal Communications - With ever increasing advances in Information and Communication Technologies, location-based services (LBS) have obtained significant attention and popularity....  相似文献   

14.
密钥的建立与管理是无线传感器网络安全的重要且基础的组成部分,是影响大规模应用的一个关键问题。近来,密钥建立与管理成为无线传感器网络安全领域一个活跃的研究分支。提出一种基于随机密钥预分配的无线传感器网络加密方案。该方案通过密钥互斥机制解决传统随机密钥预分配方案中点到点数据源认证问题。  相似文献   

15.
Wireless Personal Communications - Wireless sensor networks (WSN) are usually deployed in complicated environments, for the broadcasting features of WSN, they have high requirements for the...  相似文献   

16.
With increasing demand for data circulation, ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility. Blockchain, while decentralized and transparent,faces challenges in privacy protection and data verification, especially for sensitive data. Existing schemes often suffer from inefficiency and high overhead. We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data, with Pedersen sharding and verifying the private key, ensuring data consistency and immutability.The blockchain framework manages key shards, verifies secrets, and aids security auditing. This approach allows for trusted computation without revealing the underlying data. Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security, making data available but not visible. This study provides an effective solution for data sharing and privacy protection in blockchain applications.  相似文献   

17.
The vehicular ad hoc network (VANET) is an emerging type of network which enables vehicles on roads to inter-communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely too heavily on a tamper-proof hardware device, or do not have an effective message verification scheme. In this paper, we propose a multiple level authentication scheme which still makes use of tamper-proof devices but the strong assumption that a long-term system master secret is preloaded into all tamper-proof devices is removed. Instead the master secret can be updated if needed to increase the security level. On the other hand, messages sent by vehicles are classified into two types – regular messages and urgent messages. Regular messages can be verified by neighboring vehicles by means of Hash-based Message Authentication Code (HMAC) while urgent messages can only be verified with the aid of RSUs nearby by means of a conditional privacy-preserving authentication scheme. Through extensive simulation, we show that our multiple level authentication scheme is much more efficient that those RSU-aided authentication scheme as long as the proportion of urgent messages is less than 100%. The verification delay required can be up to 110 times smaller than other protocols. Our implementation shows that batch verification may not be as efficient as expected. In case without batch verification, the verification delay required by our scheme can even be up to 173 times smaller.  相似文献   

18.
在无线传感器网络节点随机运动的情形下,为适应移动节点所处邻居信标节点数量随时的变化,解决在信标节点稀疏情况下,满足室内环境下高精度测距定位的问题,提出基于次声波和电磁波的非同步TDOA测距解析定位算法。仿真表明,该算法具有较好的鲁棒性,并可实现厘米级定位精度。  相似文献   

19.
Wireless Personal Communications - Vehicular safety messaging is warranted mostly in turbulent traffic situations in which even cluster based MAC protocols are beset by problems of cluster rupture,...  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号