• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于聚类K匿名性的边缘计算物联网位置隐私保护

Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity.

作者信息

Jiang Nanlan, Zhai Yinan, Wang Yujun, Yin Xuesong, Yang Sai, Xu Pingping

机构信息

School of Communication and Artificial Intelligence, School of Integrated Circuits, Nanjing Institute of Technology, Nanjing 211167, China.

Electrical and Computer Engineering Faculty, Brown University, Providence, RI 02903, USA.

出版信息

Sensors (Basel). 2024 Sep 23;24(18):6153. doi: 10.3390/s24186153.

DOI:10.3390/s24186153
PMID:39338897
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11435720/
Abstract

With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of applications increases, there is an abundance of sensitive information in the communication process, pushing the focus of privacy protection towards the communication process and edge devices. The challenge lies in the fact that most traditional location privacy protection algorithms are not suited for the IoT with edge computing, as they primarily focus on the security of remote servers. To enhance the capability of location privacy protection, this paper proposes a novel K-anonymity algorithm based on clustering. This novel algorithm incorporates a scheme that flexibly combines real and virtual locations based on the requirements of applications. Simulation results demonstrate that the proposed algorithm significantly improves location privacy protection for the IoT with edge computing. When compared to traditional K-anonymity algorithms, the proposed algorithm further enhances the security of location privacy by expanding the potential region in which the real node may be located, thereby limiting the effectiveness of "narrow-region" attacks.

摘要

随着物联网(IoT)和边缘计算的发展,越来越多的设备,如传感器节点和智能自动导引车(AGV),可以作为边缘设备,通过物联网提供基于位置的服务(LBS)。随着应用数量的增加,通信过程中存在大量敏感信息,使得隐私保护的重点转向通信过程和边缘设备。挑战在于,大多数传统的位置隐私保护算法并不适用于具有边缘计算的物联网,因为它们主要关注远程服务器的安全性。为了增强位置隐私保护能力,本文提出了一种基于聚类的新型K匿名算法。这种新算法包含一种根据应用需求灵活组合真实位置和虚拟位置的方案。仿真结果表明,所提出的算法显著提高了具有边缘计算的物联网的位置隐私保护。与传统的K匿名算法相比,该算法通过扩大真实节点可能所在的潜在区域,进一步增强了位置隐私的安全性,从而限制了“窄区域”攻击的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/056d8180bb46/sensors-24-06153-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/daf3dc388451/sensors-24-06153-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/43fa7aa7d85b/sensors-24-06153-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/9bd94a15d396/sensors-24-06153-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/49b00166b33e/sensors-24-06153-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/a23b7034f821/sensors-24-06153-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/944f782cfb75/sensors-24-06153-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/4a0afd1e598c/sensors-24-06153-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/726552c233ae/sensors-24-06153-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/c9858105c349/sensors-24-06153-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/56d30008e001/sensors-24-06153-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/bd2a30527b3c/sensors-24-06153-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/27bf812aba01/sensors-24-06153-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/495e668f09c3/sensors-24-06153-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/1c6c12b9e453/sensors-24-06153-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/056d8180bb46/sensors-24-06153-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/daf3dc388451/sensors-24-06153-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/43fa7aa7d85b/sensors-24-06153-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/9bd94a15d396/sensors-24-06153-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/49b00166b33e/sensors-24-06153-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/a23b7034f821/sensors-24-06153-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/944f782cfb75/sensors-24-06153-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/4a0afd1e598c/sensors-24-06153-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/726552c233ae/sensors-24-06153-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/c9858105c349/sensors-24-06153-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/56d30008e001/sensors-24-06153-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/bd2a30527b3c/sensors-24-06153-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/27bf812aba01/sensors-24-06153-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/495e668f09c3/sensors-24-06153-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/1c6c12b9e453/sensors-24-06153-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ebc/11435720/056d8180bb46/sensors-24-06153-g015.jpg

相似文献

1
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity.基于聚类K匿名性的边缘计算物联网位置隐私保护
Sensors (Basel). 2024 Sep 23;24(18):6153. doi: 10.3390/s24186153.
2
Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering.基于动态传感器节点聚类的分布式物联网环境中的位置隐私保护
Sensors (Basel). 2019 Jul 9;19(13):3022. doi: 10.3390/s19133022.
3
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.边缘计算下用于医疗物联网的隐私保护联邦学习
IEEE J Biomed Health Inform. 2023 Feb;27(2):854-865. doi: 10.1109/JBHI.2022.3157725. Epub 2023 Feb 3.
4
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.
5
A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.一种基于序列规则推理攻击的位置隐私保护新型在线时空k匿名方法。
PLoS One. 2017 Aug 2;12(8):e0182232. doi: 10.1371/journal.pone.0182232. eCollection 2017.
6
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
7
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks.基于物联网的医疗传感器网络安全和隐私匿名函数
Sensors (Basel). 2019 Jul 17;19(14):3146. doi: 10.3390/s19143146.
8
Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning.利用联邦学习确保 EC-IoT 中的动态服务功能链编排。
Sensors (Basel). 2022 Nov 22;22(23):9041. doi: 10.3390/s22239041.
9
Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT.面向边缘计算增强型物联网的隐私保护、轻量级容错选择性聚合
Sensors (Basel). 2021 Aug 9;21(16):5369. doi: 10.3390/s21165369.
10
Device-Based Security to Improve User Privacy in the Internet of Things .基于设备的安全性提高物联网中的用户隐私。
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.

本文引用的文献

1
KD-Box: Line-segment-based KD-tree for Interactive Exploration of Large-scale Time-Series Data.KD-Box:用于大规模时间序列数据交互式探索的基于线段的KD树
IEEE Trans Vis Comput Graph. 2022 Jan;28(1):890-900. doi: 10.1109/TVCG.2021.3114865. Epub 2021 Dec 24.