• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于动态传感器节点聚类的分布式物联网环境中的位置隐私保护

Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering.

作者信息

Dimitriou Konstantinos, Roussaki Ioanna

机构信息

School of Electrical and Computer Engineering, National Technical University of Athens and Greece, 15773 Athens, Greece.

Institute of Communication and Computer Systems, 10682 Athens, Greece.

出版信息

Sensors (Basel). 2019 Jul 9;19(13):3022. doi: 10.3390/s19133022.

DOI:10.3390/s19133022
PMID:31324012
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6651351/
Abstract

One of the most significant challenges in Internet of Things (IoT) environments is the protection of privacy. Failing to guarantee the privacy of sensitive data collected and shared over IoT infrastructures is a critical barrier that delays the wide penetration of IoT technologies in several user-centric application domains. Location information is the most common dynamic information monitored and lies among the most sensitive ones from a privacy perspective. This article introduces a novel mechanism that aims to protect the privacy of location information across Data Centric Sensor Networks (DCSNs) that monitor the location of mobile objects in IoT systems. The respective data dissemination protocols proposed enhance the security of DCSNs rendering them less vulnerable to intruders interested in obtaining the location information monitored. In this respect, a dynamic clustering algorithm is that clusters the DCSN nodes not only based on the network topology, but also considering the current location of the objects monitored. The proposed techniques do not focus on the prevention of attacks, but on enhancing the privacy of sensitive location information once IoT nodes have been compromised. They have been extensively assessed via series of experiments conducted over the IoT infrastructure of FIT IoT-LAB and the respective evaluation results indicate that the dynamic clustering algorithm proposed significantly outperforms existing solutions focusing on enhancing the privacy of location information in IoT.

摘要

物联网(IoT)环境中最重大的挑战之一是隐私保护。无法保证通过物联网基础设施收集和共享的敏感数据的隐私是一个关键障碍,这延缓了物联网技术在多个以用户为中心的应用领域的广泛渗透。位置信息是最常被监测的动态信息,从隐私角度来看也是最敏感的信息之一。本文介绍了一种新颖的机制,旨在保护跨数据中心传感器网络(DCSN)的位置信息隐私,该网络用于监测物联网系统中移动对象的位置。所提出的相应数据传播协议增强了DCSN的安全性,使其更不易受到获取所监测位置信息的入侵者的攻击。在这方面,一种动态聚类算法不仅基于网络拓扑对DCSN节点进行聚类,还考虑被监测对象的当前位置。所提出的技术并不侧重于预防攻击,而是在物联网节点被攻破后增强敏感位置信息的隐私性。通过在FIT IoT-LAB的物联网基础设施上进行的一系列实验,对这些技术进行了广泛评估,相应的评估结果表明,所提出的动态聚类算法明显优于现有的侧重于增强物联网中位置信息隐私的解决方案。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/8f4a96279632/sensors-19-03022-g016a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/e1b2888e1657/sensors-19-03022-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/bed17fa553a7/sensors-19-03022-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/030cddc3216f/sensors-19-03022-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/825aee57fcdf/sensors-19-03022-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/096290fb483a/sensors-19-03022-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/9e25f9915cbe/sensors-19-03022-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a4da75ddf80b/sensors-19-03022-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a2e81ebddf84/sensors-19-03022-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/6a19f206121d/sensors-19-03022-g009a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/5582f323397a/sensors-19-03022-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/fda3ad0eb246/sensors-19-03022-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a9dcbfa2437a/sensors-19-03022-g012a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/9f3b9a352d98/sensors-19-03022-g013a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/8c8b91922236/sensors-19-03022-g014a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/cc2e2f865b3c/sensors-19-03022-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/8f4a96279632/sensors-19-03022-g016a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/e1b2888e1657/sensors-19-03022-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/bed17fa553a7/sensors-19-03022-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/030cddc3216f/sensors-19-03022-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/825aee57fcdf/sensors-19-03022-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/096290fb483a/sensors-19-03022-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/9e25f9915cbe/sensors-19-03022-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a4da75ddf80b/sensors-19-03022-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a2e81ebddf84/sensors-19-03022-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/6a19f206121d/sensors-19-03022-g009a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/5582f323397a/sensors-19-03022-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/fda3ad0eb246/sensors-19-03022-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/a9dcbfa2437a/sensors-19-03022-g012a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/9f3b9a352d98/sensors-19-03022-g013a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/8c8b91922236/sensors-19-03022-g014a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/cc2e2f865b3c/sensors-19-03022-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43b9/6651351/8f4a96279632/sensors-19-03022-g016a.jpg

相似文献

1
Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering.基于动态传感器节点聚类的分布式物联网环境中的位置隐私保护
Sensors (Basel). 2019 Jul 9;19(13):3022. doi: 10.3390/s19133022.
2
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity.基于聚类K匿名性的边缘计算物联网位置隐私保护
Sensors (Basel). 2024 Sep 23;24(18):6153. doi: 10.3390/s24186153.
3
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.SPS和DPS:无线传感器网络中两种基于网格的新源位置隐私保护方案。
Sensors (Basel). 2019 May 4;19(9):2074. doi: 10.3390/s19092074.
4
A Privacy Preserving Scheme for Nearest Neighbor Query.一种用于最近邻查询的隐私保护方案。
Sensors (Basel). 2018 Jul 27;18(8):2440. doi: 10.3390/s18082440.
5
Security and Privacy for Mobile IoT Applications Using Blockchain.使用区块链的移动物联网应用的安全与隐私
Sensors (Basel). 2021 Sep 3;21(17):5931. doi: 10.3390/s21175931.
6
Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network.无线传感器网络中的区块链机制与对称加密
Sensors (Basel). 2020 May 14;20(10):2798. doi: 10.3390/s20102798.
7
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
8
Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain.直观开发,考察隐私和安全级别基础上的协作物联网供应链系统,以及通过主动型区块链实现的透视权力。
Sensors (Basel). 2020 Jul 5;20(13):3760. doi: 10.3390/s20133760.
9
Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control.用于智能农村农场监测与控制的以隐私为中心的人工智能和物联网解决方案。
Sensors (Basel). 2024 Jun 26;24(13):4157. doi: 10.3390/s24134157.
10
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges.物联网(IoNT):从架构到安全和隐私挑战的全面综述。
Sensors (Basel). 2023 Mar 3;23(5):2807. doi: 10.3390/s23052807.

引用本文的文献

1
Algorithm and Distributed Computing for the Internet of Things.物联网的算法与分布式计算
Sensors (Basel). 2020 Aug 12;20(16):4513. doi: 10.3390/s20164513.

本文引用的文献

1
A Graph Coloring Algorithm for Large Scheduling Problems.一种用于大型调度问题的图着色算法。
J Res Natl Bur Stand (1977). 1979 Nov-Dec;84(6):489-506. doi: 10.6028/jres.084.024.
2
Semi-supervised clustering methods.半监督聚类方法。
Wiley Interdiscip Rev Comput Stat. 2013;5(5):349-361. doi: 10.1002/wics.1270.