원문정보
초록
영어
In last few years, vehicular networks (or moving objects) are gaining more and more attraction from the researchers and the automobile industries. In that, Location-Based Services (LBSs) become more feature-rich and versatile due to the explosion of mobile devices and the advances of positioning technologies. Trust and Privacy are the two key parts of security and it is undoubtedly a necessity to develop (or maintain) trust for moving objects (or vehicular users). The main aim of this paper is to propose a trust model for vehicular environment with desired level of privacy protection. The proposed model contains two different modules. First, this paper analyzed the merit and demerit of exiting location privacy protection method.Then a perceived k-value location privacy protection algorithmdiscussed to provide desired level of privacy protection. Hereafter the protocol (or procedure) of this algorithm; simulation result are discussed in detail.Second,it provides a model to maintain trust for vehicle Ad-hoc Network (VANET) users in LBSs. The results show that proposed method outperforms the existing privacy preservation method by effectively enhances privacy and trust against various adversaries. Hence,the purpose of this work is to maintain trust and certain level of privacy among vehicular users without revealing her identity in LBSs.
목차
1. Introduction
1.1 Privacy and Trust Challenges in LBSs
2. How Location Privacy and Trust Leaked?
3. Related Works
4. Analysis of the Existing Location Privacy Preserving Method
4.1 Pseudo-location Method
4.2 Path Confusion
4.3 Pseudonym Method
4.4 K-anonymity Method
4.5 Other Privacy Protection Methods
5. k-value Algorithm to Protect Location Privacy
5.1 The Analysis of Location Privacy Protection Level
5.2 Algorithm and Procedure
5.3 Experiment Simulation and Analysis of Algorithm Efficiency
6. Vehicular Trusted Computing (VTC) Model
6.1. Trusted Entities of VANET:
6.2. Levels of Trust
6.3. Properties of Trust Model
6.4. Trust Metric based on Properties
7. Future Works
8. Conclusion
Conflict of Interests
Appendix-A
References
