Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [31] Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning
    Yuhala, Peterson
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 176 - 178
  • [32] Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network
    Zhang, Zu-ping
    Song, Yang
    2ND INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA 2018), 2018, : 439 - 443
  • [33] Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    Feng, Da
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [34] LTSM: Lightweight and Trusted Sharing Mechanism of IoT Data in Smart City
    Liu, Chang
    Guo, Shaoyong
    Guo, Song
    Yan, Yong
    Qiu, Xuesong
    Zhang, Suxiang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07): : 5080 - 5093
  • [35] An Effective Privacy-Preserving and Enhanced Dummy Location Scheme for Semi-trusted Third Parties
    Zuo, Meijing
    Peng, Luyao
    Song, Jun
    WEB AND BIG DATA, PT II, APWEB-WAIM 2023, 2024, 14332 : 193 - 208
  • [36] Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities
    Albahdal, Abdullah A.
    Alzahrani, Hamdan
    Jain, Lalit Prithviraj
    Boult, Terrance E.
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [37] AN OWNERSHIP SHARING PROTOCOL FOR RFID WITHOUT A TRUSTED THIRD PARTY
    Kapoor, Gaurav
    Piramuthu, Selwyn
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 28 - 30
  • [38] RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device
    Qin, Yu
    Liu, Jingbin
    Zhao, Shijun
    Feng, Dengguo
    Feng, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [39] Trusted Reputation System for Heterogeneous Network Resource Sharing Based on Blockchain in IoT
    Li, Jingwen
    Dai, Meiling
    Lu, Yi
    Yang, Shaojie
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 210 - 219
  • [40] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
    Ali, Hisham
    Papadopoulos, Pavlos
    Ahmad, Jawad
    Pitropakis, Nikolaos
    Jaroucheh, Zakwan
    Buchanan, William J.
    2021 14TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2021), 2021,