Computer Science ›› 2018, Vol. 45 ›› Issue (10): 142-149.doi: 10.11896/j.issn.1002-137X.2018.10.027

• Information Security • Previous Articles     Next Articles

Mobile Location Privacy Protection Based on Anonymous Routing

XIONG Wan-zhu, LI Xiao-yu   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450000,China
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: To preserve the security of mobile location pravicy based on location services,a mobile location pravicy protection model based on anonymous routing was presented.This model makes every mobile node as a forwarder and uses rerouting to select a route.It uses random selected mobile node as first forwarder,queries issued by it are firstly encrypts with public key of the location information server and secondly encrypted with the public key of first forwarder.Then mobile sending node sends it to first forwarder.The first forwarder receives it and decides next hop which is either location information server or second forwarder,the first forwarder firstly decrypts it with private key of first forwar-der,then secondly encrypts it with the public key of next hop.If next hop is second forwarder,it does what the first forwarder does until the location information server receives this message.Theoretical analysis and experimental results show that the mobile location privacy protection model can ensure the location privacy of location information server and any forwarder node can acquire mobile nodes,and it can realize the location privacy protection of a mobile node at a low price.Moreover,forwarder node can be any node in the mobile network,so this model is robust and can’t fail due to the faults of some nodes.

Key words: Mobile location privacy, Anonymous routing, Encryption mechanism, Safety, Anonymity

CLC Number: 

  • TP393
[1]SHIN K G,JU X,CHEN Z,et al.Privacy protection for users of location-based services[J].Wireless Communications IEEE,2012,19(1):30-39.
[2]CHAUM D L.Untraceble electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
[3]SYVERSON P F,GOLDSCHLAG D M,REED M G.Anonymous Connections and Onion Routing[C]∥IEEE Symposium on Security and Privacy.IEEE Computer Society,1997:44.
[4]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]∥Conference on Usenix Security Symposium.USENIX Association,2004:21.
[5]RELTER M K,RUBIN A D.Crowds:Anonymity for web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):62-92.
[6]PENG Z Y,LI S P.Protecting Location Privacy in Location- based Services in Mobile Environments[J].Journal of Electroni-cs & Information Technology,2011,33(5):1211-1216.(in Chinese)
[7]SWEENEY L.k-ANONYMITY:A Moedl for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[8]LUO J,LIAO J G,LI X.LocPriv:a Scheme on Location Privacy Protection Based on Spatial Region Anonymity[J].Smallmicrocomputer Submission,2016,37(6):1273-1278.(in Chinese)
[9]GKOULALAS-DIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[J].ACM,2010,12(1):3-10.
[10]XU H Y,XU J GONG Y J,et al.Algorithms to Generate Location Privacy Protection with Spatial Cloaking[J].Journal of South China University of Technology(Natural Science Edition),2014,42(1):97-103.(in Chinese)
[11]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥International Conference on Advances in Spatial and Temporal Databases.Springer-Verlag,2007:239-257.
[12]LIU X J,CHEN Y F,LI B.Mobile Location Privacy Protection Based on Untrusted Environment[J].Computer Science,2015,42(2):108-113.(in Chinese)
[13]HUO Z,MENG X F.A Surey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Comuputers,2011,34(10):1820-1830.(in Chinese)
[14]MENG X F,PAN X.Privacy Preservation based on Location Services[J].Communications of the CCF,2010,6(6):16-23.(in Chinese)
[15]HUANG X H.Research on Location Privacy Preservation in Location-based Services[D].Chengdu:University of Electronic Science and Technology of China,2016.(in Chinese)
[16]SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232.
[17]REITER M K.Crowds:anonymity for Web transactions[J]. Acm Transactions on Information & System Security,1998,1(1):66-92.
[18]DIAZ C,CLAESSENS J,PRENEEL B.APES:Anonymity and Privacy in Electronic Services[J].Datenschutz Und Datensicherheit,2005,27(3):143-145.
[1] LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun. Systemic Muti-factors Based Verification Method for Safety-critical Software [J]. Computer Science, 2019, 46(9): 156-161.
[2] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
[3] XU Bing-feng, HE Gao-feng, ZHANG Li-ning. Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees [J]. Computer Science, 2019, 46(5): 105-110.
[4] ZHAO Meng-yao, LI Xiao-yu. Bidirectional Anonymous Secret Communication Protocol Based on Onion Routing [J]. Computer Science, 2019, 46(4): 164-171.
[5] TONG Hai,BAI Guang-wei,SHEN Hang. Double-auction-based Incentive Mechanism for k-anonymity [J]. Computer Science, 2019, 46(3): 202-208.
[6] ZHOU Yi-hua, ZHANG Bing, YANG Yu-guang, SHI Wei-min. Cluster-based Social Network Privacy Protection Method [J]. Computer Science, 2019, 46(10): 154-160.
[7] CHAI Lin-peng , ZHANG Bin. One-off Public Key Scheme for Preventing Dishonest Third Party Attacking [J]. Computer Science, 2018, 45(7): 139-142, 185.
[8] LI Yue,WANG Fang. Survey on Storage Security of Emerging Non-volatile Memory [J]. Computer Science, 2018, 45(7): 53-60.
[9] WU Zhong-zhong, LV Xin and LI Xin. Query Probability Based Dummy Location Selection Algorithm [J]. Computer Science, 2018, 45(5): 143-146, 162.
[10] CAO Min-zi, ZHANG Lin-lin, BI Xue-hua, ZHAO Kai. Personalized (α,l)-diversity k-anonymity Model for Privacy Preservation [J]. Computer Science, 2018, 45(11): 180-186.
[11] GAO Di, XU Zheng and LIU Yun-huai. Data Surge Models for Public Security Data Processing and Its Application in Unity of Security System [J]. Computer Science, 2017, 44(Z6): 342-347.
[12] WANG Li-e, XU Yuan-xin, LI Xian-xian and LIU Peng. P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System [J]. Computer Science, 2017, 44(9): 178-183.
[13] CAO Chun-ping and XU Bang-bing. Research of Privacy-preserving Tag-based Recommendation Algorithm [J]. Computer Science, 2017, 44(8): 134-139.
[14] HE Yun, WANG Wei and LI Tong. Formal Method for Describing Software Evolution Ability Feature [J]. Computer Science, 2017, 44(7): 128-136.
[15] MIAO Xu-dong, WANG Yong-chun, CAO Xing-chen and FANG Feng. Detection Approach for Security Vulnerability Based on Pattern Matching [J]. Computer Science, 2017, 44(4): 109-113.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .