Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
|
作者
Zhang H. [1 ]
Li P. [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng
来源
关键词
Digital footprint; false position technology; generate confrontation network; synthetic track; TUL task;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
页数:23
相关论文
共 50 条
  • [31] A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks
    Li, Cheng
    Zhang, Guoyin
    Mao, Yan
    Zhao, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] Data aggregation algorithm based on privacy-protection and integrity in wireless sensor networks
    Feng, Juan
    Huang, Haiping
    Zhou, Xuan
    Hu, Kangheng
    Yin, Zhengwei
    Journal of Computational Information Systems, 2014, 10 (20): : 8963 - 8971
  • [33] Research on Location Privacy Protection Methods of Wireless Sensor Network in Smart Grid
    Hua Ye
    Zhang Tao
    Huang Xiuli
    Ma Yuanyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CHEMICAL, MATERIAL AND FOOD ENGINEERING, 2015, 22 : 728 - 731
  • [34] Location Privacy Issues in Wireless Sensor Networks
    Kur, Jiri
    Stetsko, Andriy
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 160 - 169
  • [35] Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection
    Shi, Lusheng
    Li, Kai
    Zhu, Huibo
    JOURNAL OF APPLIED MATHEMATICS, 2023, 2023
  • [36] Research of Privacy Preservation of Data Aggregation in Wireless Sensor Networks
    Liu, Zhenyu
    Xu, Feng
    2021 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND INTELLIGENT CONTROL (ICCEIC 2021), 2021, : 16 - 19
  • [37] Research of Location Technology Based on Wireless Sensor Network
    Zheng, Meilin
    Zhai, Peipei
    Zou, Xu
    ENERGY DEVELOPMENT, PTS 1-4, 2014, 860-863 : 2817 - +
  • [38] Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data
    Du, Jiawen
    Pi, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [39] Research on wireless sensor privacy data measurement and classification model based on IoT technology
    Wang, Jianye
    Zhuang, Chunsheng
    Liu, Xin
    Wu, Shunli
    Wang, Ding
    An, Haoping
    International Journal of Information and Communication Technology, 2023, 22 (02) : 185 - 198
  • [40] Virtual Source-Based Location Privacy for Wireless Sensor Networks
    Raja, R. Altis
    Valli, S.
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 475 - 481