Research on Location Privacy Protection Methods for Mobile Users in 5G Environment

被引:0
|
作者
Jiang H. [1 ]
Zeng J. [1 ]
Han K. [2 ]
Liu L. [2 ]
机构
[1] School of Economy Management, Beijing University of Posts and Telecommunications, Beijing
[2] School of Electronics Engineering, Beijing University of Posts and Telecommunications, Beijing
关键词
5G environment; Location privacy protection; Privacy protection algorithm;
D O I
10.15918/j.tbit1001-0645.2020.139
中图分类号
学科分类号
摘要
To solve the location privacy disclosure problem with location based service(LBS)applied frequently in 5G environment, the risks of mobile users' location privacy disclosure in 5G environment were analyzed, the existing privacy protection technologies were investigated, and three kinds of common privacy protection methods were summarized and compared. A new privacy protection method called fusion location privacy protection method was proposed, aiming at the new challenges of location privacy protection in 5G environment. By the combination of preliminary dimension reduction treatment, location privacy protection algorithm, and transmission encryption method, the method was arranged to reduce the risks during location dimension selecting, positioning and transmitting process without increasing the complexity. Simulation results indicate that the proposed method can perform well in mixed scenarios and be suitable for the dense, high frequency LBS in 5G environment. © 2021, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:84 / 92
页数:8
相关论文
共 50 条
  • [31] HilAnchor:Location Privacy Protection in the Presence of Users’ Preferences
    倪巍伟
    郑锦旺
    崇志宏
    [J]. Journal of Computer Science & Technology, 2012, (02) : 413 - 427
  • [32] HilAnchor: Location Privacy Protection in the Presence of Users' Preferences
    Ni, Wei-Wei
    Zheng, Jin-Wang
    Chong, Zhi-Hong
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2012, 27 (02) : 413 - 427
  • [33] Users' Privacy Protection Scheme in Location Based Services
    Lin, Tu-Liang
    Wang, Pin-Jie
    [J]. ICEMT 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON EDUCATION AND MULTIMEDIA TECHNOLOGY, 2018, : 107 - 111
  • [34] HilAnchor: Location Privacy Protection in the Presence of Users’ Preferences
    Wei-Wei Ni
    Jin-Wang Zheng
    Zhi-Hong Chong
    [J]. Journal of Computer Science and Technology, 2012, 27 : 413 - 427
  • [35] PRIVACY PROTECTION FOR USERS OF LOCATION-BASED SERVICES
    Shin, Kang G.
    Ju, Xiaoen
    Chen, Zhigang
    Hu, Xin
    [J]. IEEE WIRELESS COMMUNICATIONS, 2012, 19 (01) : 30 - 39
  • [36] Protecting the Location Privacy of Mobile Social Media Users
    Wang, Shuo
    Sinnott, Richard
    Nepal, Surya
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 1143 - 1150
  • [37] Research on location privacy in mobile internet
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin
    150001, China
    [J]. Tongxin Xuebao, 9 (230-243):
  • [38] A Multi-Server Authentication Protocol Achieving Privacy Protection and Traceability for 5G Mobile Edge Computing
    Lee, Junho
    Kim, Dongwook
    Park, Jinhyun
    Park, Hyungweon
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [39] Location Privacy Preservation for Mobile Users in Location-Based Services
    Sun, Gang
    Cai, Shuai
    Yu, Hongfang
    Maharjan, Sabita
    Chang, Victor
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE ACCESS, 2019, 7 : 87425 - 87438
  • [40] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,