Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
|
作者
Zhang H. [1 ]
Li P. [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng
来源
关键词
Digital footprint; false position technology; generate confrontation network; synthetic track; TUL task;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
页数:23
相关论文
共 50 条
  • [41] Research on protection technology for location privacy in VANET
    Zhang, J.-M., 1600, Editorial Board of Journal on Communications (33):
  • [42] A key management scheme realising location privacy protection for heterogeneous wireless sensor networks
    Yuan, Erdong
    Wang, Liejun
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 32 (01) : 34 - 41
  • [43] A differential privacy protection scheme for sensitive big data in body sensor networks
    Lin, Chi
    Wang, Pengyu
    Song, Houbing
    Zhou, Yanhong
    Liu, Qing
    Wu, Guowei
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (9-10) : 465 - 475
  • [44] A differential privacy protection scheme for sensitive big data in body sensor networks
    Chi Lin
    Pengyu Wang
    Houbing Song
    Yanhong Zhou
    Qing Liu
    Guowei Wu
    Annals of Telecommunications, 2016, 71 : 465 - 475
  • [45] Privacy Protection Scheme for Data Aggregation in Wireless Sensor Networks Based on PRDA+ Protocol
    Guo, Bohua
    Zhang, Yanwu
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 40 - 51
  • [46] Privacy protection methods of location services in big data
    Liu, Wenfeng
    Wu, Juanjuan
    Xi, Zhong
    OPEN COMPUTER SCIENCE, 2022, 12 (01) : 389 - 402
  • [47] Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability
    Chen, Chung-Wei
    Tsai, Yuh-Ren
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1480 - 1490
  • [48] Using data mules to preserve source location privacy in Wireless Sensor Networks
    Raj, Mayank
    Li, Na
    Liu, Donggang
    Wright, Matthew
    Das, Sajal K.
    PERVASIVE AND MOBILE COMPUTING, 2014, 11 : 244 - 260
  • [49] Privacy Protection for Wireless Medical Sensor Data
    Yi, Xun
    Bouguettaya, Athman
    Georgakopoulos, Dimitrios
    Song, Andy
    Willemson, Jan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) : 369 - 380
  • [50] Protecting the sink location privacy in wireless sensor networks
    Lin Yao
    Lin Kang
    Pengfei Shang
    Guowei Wu
    Personal and Ubiquitous Computing, 2013, 17 : 883 - 893