• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于欺骗技术的 IoBT 网络位置隐私保护方案。

Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques.

机构信息

Department of Electrical Engineering & Computer Science, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA.

出版信息

Sensors (Basel). 2023 Mar 15;23(6):3142. doi: 10.3390/s23063142.

DOI:10.3390/s23063142
PMID:36991852
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10052172/
Abstract

The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantly from regular IoT networks. In war scenarios, real-time location information gathering is critical for combat effectiveness and is dependent on network connectivity and information sharing in the presence of an enemy. To maintain connectivity and guarantee the safety of soldiers/equipment, location information must be exchanged. The location, identification, and trajectory of soldiers/devices are all contained in these messages. A malicious attacker may utilize this information to build a complete trajectory of a target node and track it. This paper proposes a location privacy-preserving scheme in IoBT networks using deception-based techniques. Dummy identifier (DID), sensitive areas location privacy enhancement, and silence period concepts are used to minimize the attacker's ability to track a target node. In addition, to consider the security of the location information, another security layer is proposed, which generates a pseudonym location for the source node to use instead of its real location when sending messages in the network. We develop a Matlab simulation to evaluate our scheme in terms of average anonymity and probability of linkability of the source node. The results show that the proposed method improves the anonymity of the source node. It reduces the attacker's ability to link the old DID of the source node with its new DID. Finally, the results show further privacy enhancement by applying the sensitive area concept, which is important for IoBT networks.

摘要

战场事物互联网(IoBT)是指用于同步自动化决策的互联战场设备/资源。由于战场具有独特的困难,例如基础设施缺乏、设备异构性和攻击,因此 IoBT 网络与常规物联网网络有很大的不同。在战争场景中,实时位置信息的收集对于战斗力至关重要,这取决于网络连接和在敌方存在时的信息共享。为了保持连接并保证士兵/设备的安全,必须交换位置信息。这些消息包含了士兵/设备的位置、身份和轨迹。恶意攻击者可能会利用这些信息构建目标节点的完整轨迹并对其进行跟踪。本文提出了一种基于欺骗技术的 IoBT 网络中的位置隐私保护方案。使用虚拟标识符(DID)、敏感区域位置隐私增强和静默期概念来最大限度地减少攻击者跟踪目标节点的能力。此外,为了考虑位置信息的安全性,还提出了另一个安全层,该层为源节点生成一个假名位置,以便在网络中发送消息时使用,而不是使用其真实位置。我们使用 Matlab 仿真来评估我们的方案在源节点的平均匿名性和链接概率方面的性能。结果表明,所提出的方法提高了源节点的匿名性。它降低了攻击者将源节点的旧 DID 与其新 DID 联系起来的能力。最后,结果表明通过应用敏感区域概念进一步增强了隐私,这对于 IoBT 网络非常重要。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0ff5ead2b328/sensors-23-03142-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/14500883ee06/sensors-23-03142-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/8aac86d7c336/sensors-23-03142-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/43bfca558060/sensors-23-03142-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/3163e6237419/sensors-23-03142-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/9df76b1f1609/sensors-23-03142-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0f42bbc2d814/sensors-23-03142-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/613ad81ef901/sensors-23-03142-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/5bed977c546b/sensors-23-03142-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0b7a89e01edc/sensors-23-03142-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/a3e416f4077a/sensors-23-03142-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/485db00e2670/sensors-23-03142-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/3e91bce652c1/sensors-23-03142-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0ff5ead2b328/sensors-23-03142-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/14500883ee06/sensors-23-03142-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/8aac86d7c336/sensors-23-03142-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/43bfca558060/sensors-23-03142-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/3163e6237419/sensors-23-03142-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/9df76b1f1609/sensors-23-03142-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0f42bbc2d814/sensors-23-03142-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/613ad81ef901/sensors-23-03142-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/5bed977c546b/sensors-23-03142-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0b7a89e01edc/sensors-23-03142-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/a3e416f4077a/sensors-23-03142-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/485db00e2670/sensors-23-03142-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/3e91bce652c1/sensors-23-03142-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a42d/10052172/0ff5ead2b328/sensors-23-03142-g013.jpg

相似文献

1
Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques.基于欺骗技术的 IoBT 网络位置隐私保护方案。
Sensors (Basel). 2023 Mar 15;23(6):3142. doi: 10.3390/s23063142.
2
Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective.战场物联网(IoBT)的稳健性:基于有向网络的视角
Entropy (Basel). 2020 Oct 16;22(10):1166. doi: 10.3390/e22101166.
3
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity.基于聚类K匿名性的边缘计算物联网位置隐私保护
Sensors (Basel). 2024 Sep 23;24(18):6153. doi: 10.3390/s24186153.
4
PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs.PCP:一种用于车载自组网中位置隐私保护的化名更改方案。
Entropy (Basel). 2022 May 5;24(5):648. doi: 10.3390/e24050648.
5
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing.通过代理节点路由实现监测无线传感器网络中的源位置隐私保护。
Sensors (Basel). 2019 Feb 28;19(5):1037. doi: 10.3390/s19051037.
6
Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering.基于动态传感器节点聚类的分布式物联网环境中的位置隐私保护
Sensors (Basel). 2019 Jul 9;19(13):3022. doi: 10.3390/s19133022.
7
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.一种在移动边缘计算中具有道路拥塞估计的安全感知位置隐私保护 IoV 方案。
Sensors (Basel). 2023 Jan 3;23(1):531. doi: 10.3390/s23010531.
8
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
9
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.车联网中隐私保护的虚拟化名变更和动态分组策略。
Sensors (Basel). 2021 Apr 28;21(9):3077. doi: 10.3390/s21093077.
10
A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT.物联网CANNQ服务中的一种轨迹隐私保护方案。
Sensors (Basel). 2019 May 12;19(9):2190. doi: 10.3390/s19092190.

引用本文的文献

1
Deep Learning Technology to Recognize American Sign Language Alphabet.深度学习技术识别美国手语字母。
Sensors (Basel). 2023 Sep 19;23(18):7970. doi: 10.3390/s23187970.

本文引用的文献

1
An Enhanced Lightweight Dynamic PseudonymIdentity Based Authentication and Key AgreementScheme Using Wireless Sensor Networks forAgriculture Monitoring.基于无线传感器网络的农业监测增强型轻量级动态伪匿名身份认证和密钥协商方案。
Sensors (Basel). 2019 Mar 6;19(5):1146. doi: 10.3390/s19051146.