مقاله انگلیسی رایگان در مورد حفاظت از حریم خصوصی در خدمات شبکه اجتماعی وسایل نقلیه – الزویر 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 14 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع نگارش مقاله مقاله پژوهشی (Research article)
مقاله بیس این مقاله بیس میباشد
نوع مقاله ISI
عنوان انگلیسی مقاله Location and trajectory privacy preservation in 5G-Enabled vehicle social network services
ترجمه عنوان مقاله حفاظت از موقعیت و مسیر حریم خصوصی در خدمات شبکه اجتماعی وسایل نقلیه 5G فعال شده
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده و شبکه های کامپیوتری
مجله مجله شبکه و برنامه های کامپیوتری – Journal of Network and Computer Applications
دانشگاه University of Electronic Science and Technology of China – China
کلمات کلیدی حریم خصوصی موقعیت؛ حریم خصوصی مسیر سازگار؛ 5G؛ موبایل فمتوسل؛ VSN
کلمات کلیدی انگلیسی Location privacy; Trajectory privacy; 5G; Mobile Femtocell; VSN
شناسه دیجیتال – doi
https://doi.org/10.1016/j.jnca.2018.02.002
کد محصول E8609
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
1. INTRODUCTION

Vehicles now represent “the biggest mobile terminal” in the context of the Internet. The 5GAA committee (5G Automotive Alliance) has published research on the Internet of Cars in 2017 [1], and with the development of cloud computing [2-7] and big data [8-13], vehicles represent intelligent devices that can connect to the Internet and present sensing and computing abilities. Thus, vehicles are now the main carriers for mobile social networks. The Vehicular Social Network (VSN) has emerged, and vehicles can now be connected to wireless networks to improve traffic safety and promote the development of smart cars. However, the convenience of VSNs may lead to privacy concerns. The problem of privacy disclosure primarily stems from two aspects. First, for the users, certain data transmitted over the VSN are highly sensitive, such as location, trajectory, and identity information. If these sensitive data are revealed, the location privacy, trajectory privacy and identity privacy can be leaked [14]. Second, the topology of the VSN changes quickly because of the vehicle’s high-speed mobility. Thus, data transmission exploits the multiple hop relay method. However, multiple hop relays are prone to data leakage risks, which may lead to the leakage of private information. Furthermore, people are paying increasing attention to their own privacy and data security [15-21] . Therefore, this paper addresses the problem of privacy leakage in VSNs. Combined with modern communication technology (5G), the method in this paper effectively protects the vehicles’ location and trajectory privacy in the VSN. With the increasing number of connected devices and demand for data rate, the 5G wireless communication system has been a popular research area in recent years [22-23]. The next 5G can serve all types of applications/systems with extremely high user rates anytime and anywhere [24]. As a Wireless Sensor Network (WSN), VSNs will inevitably lead to extraordinary developments with the application of 5G. Compared with other WSNs, VSNs realize the modern Intelligent Transport System (ITS). However, VSNs have inherent characteristics, such as high mobility and multiple hop relays. Thus, Mobile Femtocell (MFemtocell) has been introduced for 5G technology [25]. The use of MFemtocell can significantly maximize performance, such as by realizing dynamic linking, enhancing user throughput, and reducing response times and signal overhead [26-27] . To reduce traffic accidents, vehicles send safety message periodically. The safety message includes information about the location, speed and direction of the vehicles. Although the VSN can be plugged into the 5G network seamlessly, the 5G-based VSN does not consider privacy preservation. If a malicious attacker continuously eavesdrops on the safety message, the location and trajectory privacy may be leaked. To address this problem, researchers have proposed efficient schemes that include K-anonymity [28], Mix-zone [29] , MixGroup [30], and Encryption [31-32]. The basic ideas behind these schemes are consistent. Each vehicle is assigned a pseudonym in the VSN, and then vehicles exchange the pseudonyms with each other to obscure the vehicles’ real identities. Therefore, the attacker cannot link the real identity to the corresponding vehicle, and the location privacy is protected.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا