Efficient location privacy algorithm for Internet of Things (IoT) services and applications
نویسندگان
چکیده
Location-based Services (LBS) have become a very important area for research with the rapid development of Internet of Things (IoT) technology and the ubiquitous use of smartphones and social networks in our daily lives. Although users can enjoy a lot of flexibility and conveniences from the LBS with IoT, they may also lose their privacy. Untrusted or malicious LBS servers with all users’ information can track users in various ways or release personal data to third parties. In this work, we first analyze the current dummy-location selection (DLS) algorithm—an efficient location privacy preservation approach and design an attack algorithm for DLS (ADLS) for test emerging IoT security. For efficiently preserving user’s location privacy, we propose a novel dummy location privacy-preserving (DLP) algorithm by considering both computational costs and various privacy requirements of different users. Extensive simulation experiments have been carried out to evaluate the efficiency of the proposed schemes. Evaluation results show that the ADLS algorithm has a high probability of identifying the user’s real location out from chosen dummy locations in the DLS algorithm. Our proposed DLP algorithm has clear advantages over the DLS algorithm in term of lower probability of revealing the user’s real location and improved computational cost and efficiency (i.e., time, speed, accuracy, and complexity) while preserve the same privacy level as DLS algorithm.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملIdentifying and Ranking Ethical Issues of the Internet of Things in Medical Sciences using Stepwise Weight Assessment Ratio Analysis
Background and Objectives: The Internet of Things (IoT) refers to billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The IoT has been widely applied to interconnect available medical resources and provide reliable, effective and smart healthcare service to the people. The social acceptance of IoT applications and services stron...
متن کاملInternet of Things: A Survey for the Individuals' E-Health Applications
In today's world, the Internet of Things (IoT), which is a fairly new technology, has become a popular topic for discussion. Meanwhile, the increasing demand for personalized healthcare with the assistance of new technologies has created new applications called e-health IoT applications; however, researchers are still attempting to find its applications, therefore they have not been able to foc...
متن کاملBayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 89 شماره
صفحات -
تاریخ انتشار 2017