Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
|
作者
Zhang, Hong [1 ]
Li, Pei [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng,044004, China
来源
关键词
Big data - Data privacy - Location based services - Query processing - Telecommunication services - Trajectories - Wireless sensor networks;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
相关论文
共 50 条
  • [1] Privacy Protection of Node Location and Data in Wireless Sensor Networks
    Huan, He
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 34 - 39
  • [2] Research on Location Information and Privacy Protection Based on Big Data
    Yu, Juan
    [J]. 2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 226 - 229
  • [3] Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 190 - 212
  • [4] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [5] Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    Dong, Lu
    Wang, Ruchuan
    [J]. CHINA COMMUNICATIONS, 2019, 16 (05) : 158 - 170
  • [6] Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks
    Peng Li
    Chao Xu
    He Xu
    Lu Dong
    Ruchuan Wang
    [J]. China Communications, 2019, 16 (05) : 158 - 170
  • [7] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209
  • [8] Location Privacy Protecting based on Anonymous Technology in Wireless Sensor Networks
    Wang, Xiaoyan
    Dong, Lu
    Xu, Chao
    Li, Peng
    [J]. 2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 229 - 235
  • [9] Location Protection Technology for Wireless Sensor Networks Based on Differential Privacy using DSRNN-MOA
    Nie, Yalin
    Peng, Huiling
    Shi, Nianfeng
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 2625 - 2639
  • [10] Node Location Privacy Protection in Unattended Wireless Sensor Networks
    Zhou, ZhiGang
    Wang, Yu
    Li, PanPan
    Chang, XinGong
    Luo, JiWei
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021