Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
|
作者
Zhang H. [1 ]
Li P. [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng
来源
关键词
Digital footprint; false position technology; generate confrontation network; synthetic track; TUL task;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
页数:23
相关论文
共 50 条
  • [21] Research on Data Aggregation Technology Based on Wireless Sensor Networks
    Wang, Tianming
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 127 - 134
  • [22] Research on the Privacy Protection Technology of Blockchain Spatiotemporal Big Data
    Zhou, Bao
    Zhao, Junsan
    Yin, Ying
    Chen, Guoping
    IEEE ACCESS, 2024, 12 : 111187 - 111195
  • [23] Node Location Privacy Protection Based on Differentially Private Grids in Industrial Wireless Sensor Networks
    Wang, Jun
    Zhu, Rongbo
    Liu, Shubo
    Cai, Zhaohui
    SENSORS, 2018, 18 (02):
  • [24] An Efficient Source Location Privacy Protection Algorithm Based on Circular Trap for Wireless Sensor Networks
    Wang, Yiting
    Liu, Liang
    Gao, Wenzhao
    SYMMETRY-BASEL, 2019, 11 (05):
  • [25] An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)
    Jan, Naveed
    Al-Bayatti, Ali H.
    Alalwan, Naseer
    Alzahrani, Ahmed Ibrahim
    SENSORS, 2019, 19 (09)
  • [26] Sink location privacy protection under direction attack in wireless sensor networks
    Jian Wang
    Fengyu Wang
    Zhenzhong Cao
    Fengbo Lin
    Jiayan Wu
    Wireless Networks, 2017, 23 : 579 - 591
  • [27] Credit Routing for Source-location Privacy Protection in Wireless Sensor Networks
    Lu, Zongqing
    Wen, Yonggang
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 164 - 172
  • [28] Sink location privacy protection under direction attack in wireless sensor networks
    Wang, Jian
    Wang, Fengyu
    Cao, Zhenzhong
    Lin, Fengbo
    Wu, Jiayan
    WIRELESS NETWORKS, 2017, 23 (02) : 579 - 591
  • [29] Source Location Privacy Using Data Mules in Wireless Sensor Networks
    Singh, Jyoti Prakash
    Roy, Pradeep Kumar
    Singh, Sunil Kumar
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2743 - 2747
  • [30] Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation
    Yang, Wenbo
    Zhu, Wen Tao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 252 - 266