Skip to main content
Log in

Road segment hiding algorithm of preventing replay attack under road network environment

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Location privacy protection algorithm based on Euclidean space cannot be applied to road network environment. In addition, replay attack under road network environment is also an important problem of restricting its application. On the premise of satisfying k anonymity and L road segment diversity, this paper proposes conditions of preventing replay attack under road network environment and testifies the correctness. Besides, a road segment hiding algorithm based on binary tree is designed. The experimental results prove the effectiveness of this algorithm and the algorithm can reduce the hiding time. However, in order to prevent replay attack, query time of the algorithm increases. Generally speaking, an effective and correct method is provided for protecting the user’s location privacy under road network environment and effectively preventing replay attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Brinkhoff T (2002) A framework for generating network-based moving objects. GeoInformatica 6(2):153–180

    Article  MATH  Google Scholar 

  • Chow CY, Mokbel MF, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. VLDB Endowment, pp 763–774

  • Chow CY, Mokbel MF, Bao J et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571–607

    Article  Google Scholar 

  • Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: The 25th IEEE international conference on distributed computing systems (ICDCS), pp 620–629

  • Ghinita G, Kalnis P, Mouratidis K, Papadias D (2007a) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(2):1719–1733

    Google Scholar 

  • Ghinita G, Kalnis P, Skiadopoulos S (2007) Prive: anonymous location-based queries in distributed mobile systems. In: 16th international conference on world wide web, ACM pp 371–380

  • Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services. ACM, pp 31–42

  • Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: 05′ International conference on pervasive services, pp 88–97

  • LIN, LIT (2007) t-closeness: privacy beyond K-anonymity and l-diversity. In: 23rd International conference on data engineering, Istanbul, Turkey, pp 106–115

  • Machanavajjhala A, Kifer D, Gehrke J et al (2007) l-Diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):3

    Article  Google Scholar 

  • Mokbel MF (2006) Towards privacy-aware location-based database servers. In: 22nd international conference on data engineering workshops

  • Sun Lan (2013) Location privacy protection algorithm for preventing replay attack in road networks. J Huazhong Univ Sci Tech

  • Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570

    Article  MATH  MathSciNet  Google Scholar 

  • Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042–1053

    Article  MathSciNet  Google Scholar 

  • Xu J (2011) Location privacy protection through anonymous cells in road network. J Zhe Univ 45:429–434

    Google Scholar 

  • Xue J (2011) A location privacy preserving approach on road network. Chin J Comput 34:865–878

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by funds from Universities Key Fund of Anhui Province for Young Talents of China under Grant 2013SQRL082ZD, Natural Science Research Universities Key Project of Anhui Province of China under Grant KJ2014A256 and 2016 Anhui provincial colleges and universities outstanding young talent support program key projects under Grant gxyqZD2016319.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, W. Road segment hiding algorithm of preventing replay attack under road network environment. Int J Syst Assur Eng Manag 8 (Suppl 3), 1961–1965 (2017). https://doi.org/10.1007/s13198-015-0406-y

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-015-0406-y

Keywords

Navigation