In last few years, vehicular networks (or moving objects) are gaining more and more attraction from the researchers and the automobile industries. In that, Location-Based Services (LBSs) become more feature-rich and versatile due to the explosion of mobile devices and the advances of positioning technologies. Trust and Privacy are the two key parts of security and it is undoubtedly a necessity to develop (or maintain) trust for moving objects (or vehicular users). The main aim of this paper is to propose a trust model for vehicular environment with desired level of privacy protection. The proposed model contains two different modules. First, this paper analyzed the merit and demerit of exiting location privacy protection method.Then a perceived k-value location privacy protection algorithmdiscussed to provide desired level of privacy protection. Hereafter the protocol (or procedure) of this algorithm; simulation result are discussed in detail.Second,it provides a model to maintain trust for vehicle Ad-hoc Network (VANET) users in LBSs. The results show that proposed method outperforms the existing privacy preservation method by effectively enhances privacy and trust against various adversaries. Hence,the purpose of this work is to maintain trust and certain level of privacy among vehicular users without revealing her identity in LBSs.
목차
Abstract 1. Introduction 1.1 Privacy and Trust Challenges in LBSs 2. How Location Privacy and Trust Leaked? 3. Related Works 4. Analysis of the Existing Location Privacy Preserving Method 4.1 Pseudo-location Method 4.2 Path Confusion 4.3 Pseudonym Method 4.4 K-anonymity Method 4.5 Other Privacy Protection Methods 5. k-value Algorithm to Protect Location Privacy 5.1 The Analysis of Location Privacy Protection Level 5.2 Algorithm and Procedure 5.3 Experiment Simulation and Analysis of Algorithm Efficiency 6. Vehicular Trusted Computing (VTC) Model 6.1. Trusted Entities of VANET: 6.2. Levels of Trust 6.3. Properties of Trust Model 6.4. Trust Metric based on Properties 7. Future Works 8. Conclusion Conflict of Interests Appendix-A References
키워드
Location Based ServicesPrivacy ProtectionTrust Levelk-anonymityVehicle Ad-Hoc NetworkLocation Privacy
저자
Amit Kumar Tyagi [ Research Scholar, Department of Computer Science and Engineering Pondicherry Engineering College, Puducherry-605014, India ]
Dr. N. Sreenath [ Professor, Department of Computer Science and Engineering Pondicherry Engineering College, Puducherry-605014, India ]
보안공학연구지원센터(IJHIT) [Science & Engineering Research Support Center, Republic of Korea(IJHIT)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Hybrid Information Technology
간기
격월간
pISSN
1738-9968
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Hybrid Information Technology Vol.9 No.3