A privacy-preserving distance-based incentive scheme in opportunistic VANETs

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:laoniuge
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Opportunistic vehicular ad hoc networks has extensively attracted attention from both industry and academia in recent years.However,the presence of selfish behavior of nodes could cause a severe threat to well designed opportunistic routing scheme,and even jeopardizing the whole network.In this paper,we propose a privacy-preserving distance-based incentive scheme,particularly to address issues of the nodes selfish behavior and the location privacy,to achieve three properties through secure multiparty computation and homomorphic encryption methods,such as the confidentiality of nodes position information,the integrity of the message carried distance,and the correctness of reputation computation.The proposed incentive scheme can not only satisfy following security requirements,such as mutual authentication,non-repudiation and conditional privacy-preserving,but also stimulate the active helpers and suppress bad behaviors fairly and reasonably.The security analysis and performance evaluation show that the proposed framework is efficient,safe and practical.
其他文献
Privacy-preserving data publication problem has attracted more and more attention in recent years.A lot of related research works have been done towards dataset with single sensitive attribute.However
会议
The lightweight mask scheme is a new tendency of the mask countermeasures.With this scheme,we propose several profiled and non-profiled power analyses against the RSM and RSM-Like schemes in the DPA C
In this paper,we propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified.Besides,we can adjust the maximum tampered rate a
能量分析攻击实施的依据是密码设备的能量消耗依赖于设备所执行的密码算法的中间值。因此,如果试图抵御这种攻击,就要降低甚至消除这种依赖性。布尔掩码技术为目前最为流行的防御措施。针对带循环S盒掩码的AES密码芯片,提出了一种新的相关性功耗攻击方法.该方法首先利用方差分析找出明文盲化和S盒计算的时间点,然后通过比较盲化后的字节的汉明重量和实际测量功耗值的相关系数恢复掩码,最后针对S盒输入和输出的汉明距离进
Dependability analysis is an important step in designing and analyzing safety computer systems and protection systems.Introducing multi-processor and virtual machine increases the system faults comple
In the harsh environment where node density is sparse.the slow-moving nodes cannot effectivelv utilize the encountering opportunities to realize the self-organized identity authentications.and do not
访问控制策略是网络安全防范和保护的主要策略,其任务是保证网络资源不被非法使用和非法访问。针对静态职责策略与可用策略并存时由于互斥的安全与可用需求可能引发访问控制策略不一致性冲突问题,提出了一种优化的冲突消解方法.该方法基于静态裁剪减少所需考虑的策略数量;通过计算最小冲突覆盖集合以降低问题求解的规模;度量删除每一个静态职责分离策略和可用策略所引发的安全性与可用性损失,并以此评估各个冲突消解方案的优先
The weight hierarchy of a linear [n,k;q] code C over Fq is the sequence (d1,d2,…dk ),where dris the smallest support weight of a r-dimensional subcode of C.In this paper,by using the finite projective
JPEG-Compatibility steganalysis detects the presence of secret message embedded in the JPEG decompressed images and estimates the embedding rate.We propose a JPEG-Compatibility steganalysis algorithm
Vehicle ad-hoc network have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of lots of previous research works on security of vehicle-to-infrastruc