Font Size: a A A

Research On Location Privacy Protection Scheme In Autonomous Driving Era

Posted on:2022-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2492306524480674Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of artificial intelligence(AI)and next-generation wireless communication technologies(such as 5G)and unmanned driving technology,autonomous driving has gone from being impractical before to a reality that can be achieved at present.Mature autonomous driving technology can provide passengers with an excellent comfort experience when traveling.For example,autonomous vehicles can intelligently plan travel routes to avoid traffic jams.While autonomous driving brings us convenience,the privacy and safety issues of passengers should also be worthy of our attention.The exposure of the location of autonomous vehicles will also provide attackers with opportunities to threaten the privacy of passengers.Therefore,this dissertation discusses and studies the location privacy of vehicles in the autonomous driving environment,and proposes a location privacy protection scheme based on the autonomous driving environment for the autonomous driving convoy.On this basis,for the process of pseudonym generation in location privacy protection,we propose a new pseudonym generation scheme,which can improve the efficiency of pseudonym generation.The main research contents of this dissertation on location privacy protection in the autonomous driving environment are as follows:(1)In order to protect the location privacy of the autonomous driving convoy,A scheme for establishing a dynamic mix zone based on an autonomous driving convoy is proposed is this dissertation.When establishing a dynamic mix zone,the request for the establishment of the mix zone will be forwarded in the autonomous driving convoy first,followed by outside the autonomous driving convoy.This priority request inside and outside the autonomous driving convoy is conducive to less communication delay.Secondly,we propose a new pseudonym use mechanism.When only one autonomous vehicle in the autonomous driving convoy changes its pseudonym,the autonomous vehicle can apply for the use of multiple pseudonyms within a period of time to resist the pseudonym link attack in the autonomous driving convoy.(2)This dissertation introduces a new pseudonym allocation mechanism.In the pseudonym distribution phase,the proposed scheme allows the autonomous vehicle to register with trusted authority TA,and the trusted authority TA will return a number of pseudonyms that are only valid for a period of time.After the permutation function processes the seed of a pseudonym,the pseudonym guarantees the anonymity of identity while ensuring that it is un-linkable.Other autonomous vehicles can complain by submitting the pseudonym of the defending autonomous vehicle,trusted authority TA will retrieve the real identity of the defending autonomous vehicle.(3)In order to improve the efficiency of pseudonym generation,we propose a pseudonym generation scheme based on low-density parity-check codes(LDPC).In the pseudonym generation phase,we use LDPC code to improve the efficiency of pseudonym generation.To ensure the unlinkability of the pseudonym,we use the one-way hash chain.At the same time,by controlling the length of the one-way hash chain,the proposed scheme can control the number of pseudonyms generated at one time.Finally,compared with the scheme to protect location privacy in the traditional vehicular network,the proposed scheme has less overhead and a higher level of security.
Keywords/Search Tags:Autonomous driving, Vehicular network, Location privacy, Mix zone
PDF Full Text Request
Related items