Location-based services have been widely used in daily life, providing diversified services for users. However, users may face the risk of trajectory privacy disclosure while enjoying the convenience of location-based services. Most of the existing trajectory protection schemes cannot match the road network and are vulnerable to attacks based on background information. In this paper, the concept
... [Show full abstract] of salp swarm algorithm is introduced to construct salp-like swarm algorithm, which can generate K−1 false trajectories that are highly similar to real trajectories. It is difficult for attackers to distinguish them. Besides, a road network matching model is designed in order to match the proposed trajectory privacy protection algorithm with the real road network environment, so that the effect of trajectory privacy protection is improved. Morever, a false location selection mechanism is proposed to find false location points, which not only considers the location and speed of users, but also ensures that the selection of false location points is more in line with the road network environment. The experimental results show that, under the condition of satisfying the same service quality, the trajectory privacy leakage probability of this scheme is reduced by 33% compared with the existing schemes, and it has better privacy protection effect.