Abstract

With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society. Once the information of the Internet of Vehicles is exposed by the online ride-hailing platform or stolen by hackers, it will pose a fatal threat to the personal and property safety of users, and even cause a major information security accident to the whole society. Based on a post-quantum cryptography system, this paper proposes a practical privacy protection scheme for ride-hailing route information, which can present the complete statistical aggregation operation of the route and the frequency from the starting point to the destination without the visibility of the ride-hailing platform, and ensure the data privacy security of a single vehicle. Compared with representative multi-vehicle aggregation solutions, we not only guarantee message privacy, confidentiality, integrity, forward and backward security, anti-man in attack and anti-redial attack, but also achieve multi-dimensional aggregation, CCA security and anti-quantum attack. Through the analysis of the experiment, the cost of our scheme is reasonable. Therefore, the scheme is more practical in this scenario.

Highlights

  • The Internet of Vehicles (IoV) is derived from the Internet of Things, which is the Internet of things for vehicles

  • Thanks to the recent explosive growth of the ride-hailing business, a large amount of private information is collected through the IoV, which includes user starting point information, vehicle conversation information and vehicle driving record, etc

  • We need to complete the aggregation of privacy protection data by integrating some of the technologies of previous solutions, and building trust between government and control centers, base stations and vehicles

Read more

Summary

INTRODUCTION

The Internet of Vehicles (IoV) is derived from the Internet of Things, which is the Internet of things for vehicles. Attempts have been made to tackle these challenges Xue et al, He et al, Liu et al, Saleem et al, Song et al, and Li et al [7,8,9,10,11,12] respectively proposed some simple sensing devices, privacy protection data collection and aggregation solutions for mobile devices, vehicle-mounted devices, smart grid and other application scenarios. Hackers can know when the user went from where to where, and how many times To this end, we need to complete the aggregation of privacy protection data by integrating some of the technologies of previous solutions, and building trust between government and control centers, base stations and vehicles.

GUIDELINES FOR MANUSCRIPT PREPARATION
LATTICE-BASED HOMOMORPHIC ENCRYPTION
SYMBOL
SYSTEM MODEL
OUR PROPOSED SCHEME
SECURITY ANALYSIS AND PROOF
COMMUNICATION OVERHEAD
PERFORMANCE EVALUATION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call