Font Size: a A A

Research On Internet Of Vehicles Authentication And Privacy Protection Based On LBS

Posted on:2021-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:X M LiuFull Text:PDF
GTID:2392330620464099Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the gradual development of Internet of vehicles and the increasing number of vehicles,higher requirements are put forward for the security of message authentication and trajectory data submission of Internet of vehicles.When making LBS requests,the vehicle density is large and a large number of LBS requests are made at the same time,which will lead to the loss of packets due to the insufficient storage space and processing capacity of the server,or lead to the large delay of important LBS and cause major traffic accidents.In the research of trajectory privacy protection,there are different privacy protection requirements in different time periods,which provides further room for improvement of trajectory privacy protection algorithm.This paper proposes corresponding solutions to the above problems.The main contents and innovations include the following two points:(1)In order to solve the problems of high delay and insufficient processing ability of LBS request,this paper proposes a scheme based on LBS request.Based on the research of identity authentication in a large number of fog computing architectures,this scheme implements a LBS message authentication scheme which can cache the result of identity authentication.After authentication,when the vehicle moves between the fog server and the fog area,the fog server can distribute and cache the authentication results according to the scene.When authenticating LBS messages,the fog server can use the cached authentication results to authenticate LBS requests without re authentication,thus reducing the request delay.At the same time,a priority based lbs request processing algorithm is proposed to process LBS requests in the fog server.This algorithm evaluates the priority of vehicle LBS requests.After the priority processing algorithm processing,it makes LBS requests in high priority priority priority authentication,so as to solve the problem of important LBS requests packet loss or delay when a large number of requests arrive at the fog server at the same time.Therefore,the whole scheme has better performance in authentication efficiency and average request time.(2)In order to solve the problem that tracks have different privacy protection requirements in different time periods,this paper proposes an algorithm of track privacy protection in lbs.The algorithm includes path clustering,condition constraint,weight calculation,undirected weight graph and anonymous set.First,the initial clustering of tracks is carried out according to the start time and end time of tracks,then the tracks are constrained based on the(S,D)constraint conditions of the included angle and distance between tracks,and the personalized weight calculation is carried out according to the distance between tracks and the included angle of tracks.Before the construction of anonymous set,the undirected weight graph is constructed according to the above personalized weight graph.For different time periods of users,there are For the problem of different privacy requirements,the tracks with the same privacy requirements and low weight are integrated into an anonymous set by greedy thought,so that the tracks of the same anonymous set have the most similar privacy protection requirements.Therefore,the trajectory privacy protection algorithm under the whole lbs can obtain better trajectory privacy protection effect and information loss rate.
Keywords/Search Tags:Internet of Vehicles, LBS, Message authentication, Priority, Track privacy protection
PDF Full Text Request
Related items