ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2014, Vol. 51 ›› Issue (11): 2483-2492.doi: 10.7544/issn1000-1239.2014.20131074

• 信息安全 • 上一篇    下一篇



  1. 1(西安电子科技大学计算机学院 西安 710071);2(信息安全国家重点实验室(中国科学院信息工程研究所) 北京 100093);3(河南工业大学信息科学与工程学院 郑州 450001) (
  • 出版日期: 2014-11-01

Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach

He Yunhua1, Sun Limin1,2, Yang Weidong2,3, Li Zhi2, Li Hong2   

  1. 1(School of Computer Science and Technology, Xidian University, Xi’an 710071); 2(State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093); 3(College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001)
  • Online: 2014-11-01

摘要: 利用车辆移动“众包模式”为驾驶员提供实时路况信息和探索新的商业服务模式,是车载感知网络的新型应用之一.然而,车辆移动轨迹中的敏感信息易与用户身份相关联,存在隐私泄露问题.提出了一种车载感知网络节点轨迹隐私保护算法,克服了匿名和隐藏技术缺乏数据真实性权衡的缺点,并考虑到多种攻击策略的影响.对于给定的一系列轨迹集,首先确定边信息概率分布,建立攻击者和防御者模型,通过求解攻防博弈中的纳什均衡选择最优的防御策略,并证明其有效性.在此基础上,折中轨迹数据真实性和隐私性,以最大化防御者效用为目标,提出轨迹隐私保护算法.实验结果表明,防御策略在不同的攻击策略下展现出不同的性能,算法所选择的防御策略优于其他的策略.

关键词: 车载感知网络, 轨迹隐私, 博弈论, 最优防御策略, 均衡

Abstract: By using crowdsourcing, vehicular sensor networks (VSN) are considered essential for achieving automatic and dynamic traffic information collection, and have created various fresh new business applications and services in our daily lives. However, the published trajectories that collected in VSNs raise significant privacy concerns. These existing methods, such as anonymization and cloaking techniques, though they are attractive for providing strong privacy guarantees, generally fail to satisfy the accuracy requirements of the trajectory data based applications. In addition, different attack strategies will result in quite different performance under various privacy preserving strategies. In order to address these challenges, we present a location privacy protection method, the DefenseGame algorithm. Given a set of trajectories and a probability density function for side information, the algorithm can assist the defender in selecting the optimal defense strategies by calculating the equilibriums in attack and defense games. In the attack and defense game, we use a game-theoretic model to capture the behavior of the adversary and defender, and we show the effectiveness of the two kinds of defense strategies in the adversary’s inference attacks. Our experimental results indicate that the same defense strategy shows different performance for attack strategies and the proposed algorithm can help to obtain higher defender’s utility compared with other approaches.

Key words: vehicular sensor network (VSN), trace privacy, game theory, optimal defense strategies, equilibrium