Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
|
作者
Zhang, Hong [1 ]
Li, Pei [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng,044004, China
来源
关键词
Big data - Data privacy - Location based services - Query processing - Telecommunication services - Trajectories - Wireless sensor networks;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
相关论文
共 50 条
  • [31] Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection
    Shi, Lusheng
    Li, Kai
    Zhu, Huibo
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2023, 2023
  • [32] Location Privacy Issues in Wireless Sensor Networks
    Kur, Jiri
    Stetsko, Andriy
    [J]. FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 160 - 169
  • [33] Research of Privacy Preservation of Data Aggregation in Wireless Sensor Networks
    Liu, Zhenyu
    Xu, Feng
    [J]. 2021 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND INTELLIGENT CONTROL (ICCEIC 2021), 2021, : 16 - 19
  • [34] Research of Location Technology Based on Wireless Sensor Network
    Zheng, Meilin
    Zhai, Peipei
    Zou, Xu
    [J]. ENERGY DEVELOPMENT, PTS 1-4, 2014, 860-863 : 2817 - +
  • [35] Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data
    Du, Jiawen
    Pi, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Virtual Source-Based Location Privacy for Wireless Sensor Networks
    Raja, R. Altis
    Valli, S.
    [J]. IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 475 - 481
  • [37] A key management scheme realising location privacy protection for heterogeneous wireless sensor networks
    Yuan, Erdong
    Wang, Liejun
    [J]. International Journal of Sensor Networks, 2020, 32 (01): : 34 - 41
  • [38] A key management scheme realising location privacy protection for heterogeneous wireless sensor networks
    Yuan, Erdong
    Wang, Liejun
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 32 (01) : 34 - 41
  • [39] Privacy Protection Scheme for Data Aggregation in Wireless Sensor Networks Based on PRDA+ Protocol
    Guo, Bohua
    Zhang, Yanwu
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 40 - 51
  • [40] A differential privacy protection scheme for sensitive big data in body sensor networks
    Lin, Chi
    Wang, Pengyu
    Song, Houbing
    Zhou, Yanhong
    Liu, Qing
    Wu, Guowei
    [J]. ANNALS OF TELECOMMUNICATIONS, 2016, 71 (9-10) : 465 - 475