Computer Science ›› 2018, Vol. 45 ›› Issue (10): 142-149.doi: 10.11896/j.issn.1002-137X.2018.10.027

• Information Security • Previous Articles     Next Articles

Mobile Location Privacy Protection Based on Anonymous Routing

XIONG Wan-zhu, LI Xiao-yu   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450000,China
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: To preserve the security of mobile location pravicy based on location services,a mobile location pravicy protection model based on anonymous routing was presented.This model makes every mobile node as a forwarder and uses rerouting to select a route.It uses random selected mobile node as first forwarder,queries issued by it are firstly encrypts with public key of the location information server and secondly encrypted with the public key of first forwarder.Then mobile sending node sends it to first forwarder.The first forwarder receives it and decides next hop which is either location information server or second forwarder,the first forwarder firstly decrypts it with private key of first forwar-der,then secondly encrypts it with the public key of next hop.If next hop is second forwarder,it does what the first forwarder does until the location information server receives this message.Theoretical analysis and experimental results show that the mobile location privacy protection model can ensure the location privacy of location information server and any forwarder node can acquire mobile nodes,and it can realize the location privacy protection of a mobile node at a low price.Moreover,forwarder node can be any node in the mobile network,so this model is robust and can’t fail due to the faults of some nodes.

Key words: Anonymity, Anonymous routing, Encryption mechanism, Mobile location privacy, Safety

CLC Number: 

  • TP393
[1]SHIN K G,JU X,CHEN Z,et al.Privacy protection for users of location-based services[J].Wireless Communications IEEE,2012,19(1):30-39.
[2]CHAUM D L.Untraceble electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
[3]SYVERSON P F,GOLDSCHLAG D M,REED M G.Anonymous Connections and Onion Routing[C]∥IEEE Symposium on Security and Privacy.IEEE Computer Society,1997:44.
[4]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]∥Conference on Usenix Security Symposium.USENIX Association,2004:21.
[5]RELTER M K,RUBIN A D.Crowds:Anonymity for web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):62-92.
[6]PENG Z Y,LI S P.Protecting Location Privacy in Location- based Services in Mobile Environments[J].Journal of Electroni-cs & Information Technology,2011,33(5):1211-1216.(in Chinese)
彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216.
[7]SWEENEY L.k-ANONYMITY:A Moedl for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[8]LUO J,LIAO J G,LI X.LocPriv:a Scheme on Location Privacy Protection Based on Spatial Region Anonymity[J].Smallmicrocomputer Submission,2016,37(6):1273-1278.(in Chinese)
罗健,廖俊国,李雄.LocPriv:一种基于空间区域匿名的位置隐私保护方案[J].小型微型计算机系统,2016,37(6):1273-1278.
[9]GKOULALAS-DIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[J].ACM,2010,12(1):3-10.
[10]XU H Y,XU J GONG Y J,et al.Algorithms to Generate Location Privacy Protection with Spatial Cloaking[J].Journal of South China University of Technology(Natural Science Edition),2014,42(1):97-103.(in Chinese)
徐红云,许隽,龚羽菁,等.基于空间混淆位置隐私保护的位置隐私区域生成算法[J].华南理工大学学报(自然科学版),2014,42(1):97-103.
[11]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥International Conference on Advances in Spatial and Temporal Databases.Springer-Verlag,2007:239-257.
[12]LIU X J,CHEN Y F,LI B.Mobile Location Privacy Protection Based on Untrusted Environment[J].Computer Science,2015,42(2):108-113.(in Chinese)
刘学军,陈玉凤,李斌.基于不可信环境的移动位置隐私保护[J].计算机科学,2015,42(2):108-113.
[13]HUO Z,MENG X F.A Surey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Comuputers,2011,34(10):1820-1830.(in Chinese)
霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830.
[14]MENG X F,PAN X.Privacy Preservation based on Location Services[J].Communications of the CCF,2010,6(6):16-23.(in Chinese)
孟晓峰,潘晓.基于位置服务的隐私保护[J].中国计算机协会通讯,2010,6(6):16-23.
[15]HUANG X H.Research on Location Privacy Preservation in Location-based Services[D].Chengdu:University of Electronic Science and Technology of China,2016.(in Chinese)
黄勋辉.基于位置服务的位置隐私保护研究[D].成都:电子科技大学,2016.
[16]SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232.
[17]REITER M K.Crowds:anonymity for Web transactions[J]. Acm Transactions on Information & System Security,1998,1(1):66-92.
[18]DIAZ C,CLAESSENS J,PRENEEL B.APES:Anonymity and Privacy in Electronic Services[J].Datenschutz Und Datensicherheit,2005,27(3):143-145.
[1] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[2] CHEN Yong-ping, ZHU Jian-qing, XIE Yi, WU Han-xiao, ZENG Huan-qiang. Real-time Helmet Detection Algorithm Based on Circumcircle Radius Difference Loss [J]. Computer Science, 2022, 49(6A): 424-428.
[3] SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73.
[4] WANG Wen-xuan, HU Jun, HU Jian-cheng, KANG Jie-xiang, WANG Hui, GAO Zhong-jie. Test Case Generation Method Oriented to Tabular Form Formal Requirement Model [J]. Computer Science, 2021, 48(5): 16-24.
[5] YANG Zhi-bin, YANG Yong-qiang, YUAN Sheng-hao, ZHOU Yong, XUE Lei, CHENG Gao-hui. Terminology Recommendation and Requirement Classification Method for Safety-critical Software [J]. Computer Science, 2021, 48(5): 32-44.
[6] SHI Tie-zhu, QIAN Jun-yan, PAN Hai-yu. Fuzzy Safety and Liveness Properties [J]. Computer Science, 2021, 48(4): 31-36.
[7] LUO Chen, HU Ming, XIAO Huan-quan, ZHONG Lin-feng. Research on Behavior of Travel Mode Choice Under Duration of Public Health Emergencies Basedon SEM Model [J]. Computer Science, 2021, 48(11A): 655-658.
[8] FU Zhen-hao, LIN Ding-kang, JIANG Hao-chen, YAN Jia-qi. Survey of Anonymous and Tracking Technology in Zerocash [J]. Computer Science, 2021, 48(11): 62-71.
[9] JIN Yu-fang, WU Xiang, DONG Hui, YU Li, ZHANG Wen-an. Improved YOLO v4 Algorithm for Safety Helmet Wearing Detection [J]. Computer Science, 2021, 48(11): 268-275.
[10] SUN Xiao-xiang, CHEN Zhe. Study on Correctness of Memory Security Dynamic Detection Algorithm Based on Theorem Proving [J]. Computer Science, 2021, 48(1): 268-272.
[11] XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240.
[12] WU Hong-tao, LIU Li-yuan, MENG Ying, RONG Ya-peng and LI Lu-kai. Novel Threat Degree Analysis Method for Scattered ObJects in Road Traffic Based on Dynamic Multi-feature Fusion [J]. Computer Science, 2020, 47(6A): 196-205.
[13] FENG An-qi, QIAN Li-ping, OUYANG Jin-yuan, WU Yuan. Vehicular Networking Enabled Vehicle State Prediction with Two-level Quantized AdaptiveKalman Filtering [J]. Computer Science, 2020, 47(5): 230-235.
[14] TANG Hong-ying, HU Jun, CHEN Shuo, SHI Meng-ye. System Safety Analysis Tool for SysML and Case Study [J]. Computer Science, 2020, 47(5): 284-294.
[15] TANG Min, WANG Dong-qiang, ZENG Xin-yu. Active Safety Prediction Method for Automobile Collision Warning [J]. Computer Science, 2020, 47(4): 318-322.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!