Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [1] Blockchain-Driven Trusted Data Sharing With Privacy Protection in IoT Sensor Network
    Ma, Zhaofeng
    Wang, Lingyun
    Zhao, Weizhe
    IEEE SENSORS JOURNAL, 2021, 21 (22) : 25472 - 25479
  • [2] Position Sharing for Location Privacy in Non-trusted Systems
    Duerr, Frank
    Skvortsov, Pavel
    Rothermel, Kurt
    2011 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2011), 2011, : 189 - 196
  • [3] Blockchain-based trusted data sharing among trusted stakeholders in IoT
    Shi, Peichang
    Wang, Huaimin
    Yang, Shangzhi
    Chen, Chang
    Yang, Wentao
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (10) : 2051 - 2064
  • [4] LTSM: Lightweight and Trusted Sharing Mechanism of IoT Data in Smart City
    Liu, Chang
    Guo, Shaoyong
    Guo, Song
    Yan, Yong
    Qiu, Xuesong
    Zhang, Suxiang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07): : 5080 - 5093
  • [5] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [6] Privacy-preserving raw data collection without a trusted authority for IoT
    Liu, Yi-Ning
    Wang, Yan-Ping
    Wang, Xiao-Fen
    Xia, Zhe
    Xu, Jing-Fang
    COMPUTER NETWORKS, 2019, 148 : 340 - 348
  • [7] Privacy Enhanced Trusted Network Connect
    Bente, Ingo
    Vieweg, Joerg
    von Helden, Josef
    TRUSTED SYSTEMS, 2010, 6163 : 129 - 145
  • [8] BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control
    Chen, Liqiu
    Feng, Tao
    Ma, Rong
    Shi, Jianming
    COMPUTER COMMUNICATIONS, 2024, 225 : 279 - 288
  • [9] Location Sharing with Trusted Peers - Measuring Sensitivity of Location Observations
    Rechert, Klaus
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 73 - 78
  • [10] Software Trusted Startup and Update Protection Scheme of IoT Devices
    Zhang, Mengqiao
    Zhang, Yingpeng
    Li, Shizhong
    Wan, Qinjun
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 147 - 152