| Literature DB >> 30060446 |
Yuhang Wang1, Zhihong Tian2, Hongli Zhang3, Shen Su4, Wei Shi5.
Abstract
In recent years, location privacy concerns that arise when using the nearest neighbor query services have gained increasing attention, as such services have become pervasive in mobile social networks devices and the IoT environments. State-of-the-art privacy preservation schemes focus on the obfuscation of the location information, which has suffered from various privacy attacks and the tradeoff of the quality of service. By noticing the fact that the user's location could be replaced by their surrounding wireless sensor infrastructures in proximity, in this paper, we propose a wireless sensor access point-based scheme for the nearest neighbor query, without using the location of the user. Then, a noise-addition-based method that preserves user's location privacy was proposed. To further strengthen the adaptability of the approach to real-world environments, several performance-enhancing methods are introduced, including an R-tree-based Noise-Data Retrieval Algorithm (RNR), and a nearest neighbor query method based on our research. Both performance and security evaluations are conducted to validate our approach. The results show the effectiveness and the practicality of our work.Entities:
Keywords: Internet of Things; R-tree; location privacy; nearest neighbor query; noise addition; wireless sensor localization
Year: 2018 PMID: 30060446 PMCID: PMC6111306 DOI: 10.3390/s18082440
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An example of LS and NNQ.
Figure 2The basic idea of our approach. (a) AP spatial distribution and their signal coverage area; (b) undigraph G; (c) R-tree T of the clique snippets.
Figure 3System architecture.
Figure 4Noise data set concerning the query probability.
Glossary of Symbols and Abbreviations.
| Symbols and Abbreviations | Full Term |
|---|---|
|
| Clustering coefficient of a vertex in |
|
| Undigraph model of APs |
|
| R-tree of the AP snippets |
|
| Query probability of the grid cell |
|
| The Matrix of query probabilities of the grid cells |
|
| Geolocation set that contains |
|
| Query probabilities of each cell that covers the geolocation in |
Figure 5CPU time of RNR and the brute-force algorithm as k increases from 3 to 20 using a fixed of 5.
Figure 6Experiment results of resistance to direct observation attack. (a) x vs. k with a fixed of 5; (b) x vs. with a fixed k of 10.
Figure 7Experiment results of resistance on the statistical inference attack. (a) x and H vs. k with the initial M; (b) x and H vs. t with the dynamic M.