透過您的圖書館登入
IP:3.144.27.199
  • 學位論文

車輛網路中低成本的位置隱私保護之研究

Low-Cost Location Privacy Protection for Vehicular Networks

指導教授 : 逄愛君

摘要


位置隱私權是位置服務中已經被廣泛討論的重要的議題,許多保護位置隱私的方法已經被提出。由於更換假名的位置隱私保護方法,不需要額外的第三方伺服器,也不會造成額外的通訊成本,因此已經被廣泛的討論。然而,這些已經存在的位置隱私保護方法,並未考慮更換假名的次數。當更換假名的同時,在位置伺服器上的服務將會中斷且路由必須重新建立,這些現象將導致通訊成本提高。由於此現象的發現,本篇論文提出了一個低成本的位置隱私之保護方法,來達到更好的位置資訊保護,並同時最小化無法服務的的時間。本論文的考量因素包含假名的維持時間,車輛的移動速度以及車輛的行進方向。根據以上考量因素的組合,將包含四個方法AS、AD、SD 和ADS。本論文提出評估指標"分數"來評估更換假名的方法之效率。根據保護率以及更換假名的成本,"分數"被定義為在所有旅行時間中安全且可使用的時間之比例。模擬結果顯示目前已經存在的方法,例如SLOW 和SPOT 雖然可以有比較高的安全性,但這些方法將產生由於更換假名次數過多而造成的成本。模擬結果也顯示,AS、AD 和ADS 在少量更換假名且高安全性的情況下都有不錯的表現,其中ADS 是表現最好的方法。

並列摘要


In a Vehicular Ad-hoc Network (VANET) environment, it is known that Location-Based Service (LBS) leads to serious concerns on location privacy. To tackle this issue, different mechanisms of the location privacy in VANET have been proposed in the literature. Among them, pseudonym changing mechanisms do not need a trusted third party location server and have no the drawbacks of extra communication cost, and hence have attracted a wide spread attention. However, most existing location privacy mechanisms based on pseudonym changing do not take the number of pseudonym changes into account. While performing pseudonym changes, the services from the location server will be interrupted and the routing has to be reestablished incurring communication overheads. In light of this observation, this study proposes low cost location privacy mechanisms to achieve better location privacy protection and to minimize the service unavailable time as well. Our intention is to devise criteria for performing pseudonym changes by considering the age of pseudonyms, the speed of the vehicles and the moving direction of vehicles. Four mechanisms AS, AD, SD and ADS are devised by using the combination of these factors. Also, to evaluate the effectiveness of the pseudonym change mechanisms, an evaluation metric Score is proposed. By considering both the protection rate and the overhead of pseudonym changes, Score is formulated to represent the ratio of the safe and available time to the whole travel time. Simulation results show that although some exiting mechanisms, such as SLOW and SPOT, can achieve high security level but they are not really effective due to the overhead incurred from a large number of pseudonym changes. Simulation results also show that the proposed mechanism AS, AD, and ADS have good performance in terms of high protection rate with less number of pseudonym changes, and, in particular, ADS always has the best performance.

參考文獻


[1] X. Wang, X. Pang, and Y. Luo, “Lbs-p: A lbs platform supporting online map services,” IEEE Vehicular Technology Conference, pp. 1–5, Sep. 2010.
[2] B. Harrison and A. Dey, “What have you done with location-based services lately?” IEEE Pervasive Computing, vol. 8, no. 4, pp. 66–70, Oct. 2009.
[3] Nitesh Patel, “The 10 billion rule: Location, location, location.” [Online]. Available: http://www.strategyanalytics.com/default.aspx?mod=reportabstractviewer&a0=6355
[4] G. Myles, A. Friday, and N. Davies, “Preserving privacy in environments with location-based applications,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 56–64, Jan. 2003.
[5] M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” ACM MobiSys, pp. 31–42, Jan. 2003.

延伸閱讀