Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT

被引:5
|
作者
Liu, Shushu [1 ]
Yan, Zheng [1 ,2 ]
机构
[1] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[2] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Privacy; Protocols; Sensitivity; Input variables; Urban areas; Vehicular ad hoc networks; Transportation; Cloud computing; device to device (D2D) communications; D2D positioning; fifth-generation (5G); location privacy protection; vehicle to vehicle (V2V); LOCALIZATION;
D O I
10.1109/JIOT.2022.3161148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High-accuracy positioning has drawn huge attention with the potential in enhancing location-aware communications, intelligent transportation, and so on. The emergency of the fifth-generation (5G) technologies, such as device-to-device (D2D) communications, vehicle-to-vehicle (V2V) communications, and crowdsourcing networks is expected to help achieve highly accurate positioning. By employing nearby mobile terminals to estimate position cooperatively, these technologies can improve positioning accuracy effectively, especially in indoor and urban areas. Despite the benefit, the potential information disclosure in these positioning systems threatens the engagement of public participants (also known as reference points). The location of the reference points and their distances to a target point is quite sensitive since they can be easily used to locate the reference points once exposed. Though existing solutions based on Paillier homomorphic encryption have been proposed to preserve the privacy of distance information. The sensitivity of reference points' locations is ignored. Additionally, the adoption of Paillier introduces a high computation cost, which is impractical in reality. To address the above problems, this article proposes two efficient protocols, named Pub-pos and Pri-pos. By leveraging matrix concatenation and multiplication, these two protocols can disguise the original sensitive data, including both distance and location information, into a random matrix while keeping a positioning result intact. We analyze the security strength, complexity, and optimal variable selection of the proposed protocols. Numerous experiments verify that our proposed protocols have significant efficiency improvement in both system and individual levels compared with a Paillier-based solution.
引用
收藏
页码:18527 / 18538
页数:12
相关论文
共 50 条
  • [1] Achieving Efficient Computation Tasks for 5G-Enabled Industrial IoT Applications
    Hu, Peng
    [J]. 2020 14TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2020), 2020,
  • [2] Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges
    Gope, Prosanta
    Sikdar, Biplab
    Saxena, Neetesh
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 867 - 869
  • [3] An Efficient and Dependable UAV-Assisted Code Dissemination in 5G-Enabled Industrial IoT
    Sharma, Ravi
    Villanyi, Balazs
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 1525 - 1536
  • [4] Efficient and Privacy Preserving Video Transmission in 5G-Enabled IoT Surveillance Networks: Current Challenges and Future Directions
    Muhammad, Khan
    Hussain, Tanveer
    Rodrigues, Joel J. P. C.
    Bellavista, Paolo
    de Macedo, Antonio Roberto L.
    de Albuquerque, Victor Hugo C.
    [J]. IEEE NETWORK, 2021, 35 (02): : 26 - 33
  • [5] Study on Security and Privacy in 5G-Enabled Applications
    Qiu, Qin
    Liu, Shenglan
    Xu, Sijia
    Yu, Shengquan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [6] Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
    Mistry, Ishan
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    [J]. MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2020, 135
  • [7] Leveraging big data analytics in 5G-enabled IoT and industrial IoT for the development of sustainable smart cities
    Mukherjee, Suprakash
    Gupta, Shashank
    Rawlley, Oshin
    Jain, Siddhant
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (12)
  • [8] Security and Privacy Challenges in 5G-Enabled Vehicular Networks
    Lai, Chengzhe
    Lu, Rongxing
    Zheng, Dong
    Shen, Xuemin Sherman
    [J]. IEEE NETWORK, 2020, 34 (02): : 37 - 45
  • [9] Exploiting Multihoming Capabilities in 5G-Enabled IoT Nodes
    Fayos-Jordan, Rafael
    Felici-Castell, Santiago
    Segura-Garcia, Jaume
    Alcaraz-Calero, Jose M.
    Cervello-Duato, Antonio
    [J]. IEEE ACCESS, 2023, 11 : 134940 - 134950
  • [10] An Efficient Approach to Sharing Edge Knowledge in 5G-Enabled Industrial Internet of Things
    Lin, Yaguang
    Wang, Xiaoming
    Ma, Hongguang
    Wang, Liang
    Hao, Fei
    Cai, Zhipeng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 930 - 939