Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [31] Trusted reputation system for heterogeneous network resource sharing based on blockchain in IoT
    Li, Jingwen
    Dai, Meiling
    Lu, Yi
    Yang, Shaojie
    WIRELESS NETWORKS, 2025, 31 (02) : 1421 - 1433
  • [32] Trusted Reputation System for Heterogeneous Network Resource Sharing Based on Blockchain in IoT
    Li, Jingwen
    Dai, Meiling
    Lu, Yi
    Yang, Shaojie
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 210 - 219
  • [33] Cryptanalysis of secret-sharing multi-signature scheme without trusted centre
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Huanan Ligong Daxue Xuebao, 2008, 9 (52-54):
  • [34] Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
    Xu, Chang
    Zhang, Lvhan
    Zhu, Liehuang
    Zhang, Chuan
    Du, Xiaojiang
    Guizani, Mohsen
    Sharif, Kashif
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 107 - 116
  • [35] Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid
    Zuo, Xiangjian
    Li, Lixiang
    Peng, Haipeng
    Luo, Shoushan
    Yang, Yixian
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 395 - 406
  • [36] Enhanced-Blind Approach for Privacy Protection of IoT
    Sen, Adnan Ahmed Abi
    Eassa, Fathy Albouraey
    Jambi, Kamal
    Bahbouh, Nour Mahmoud
    Albouq, Sami S.
    Alshanqiti, Abdullah
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 240 - 243
  • [37] Sandbox Computing: A Data Privacy Trusted Sharing Paradigm Via Blockchain and Federated Learning
    Guo, Shaoyong
    Zhang, Keqin
    Gong, Bei
    Chen, Liandong
    Ren, Yinlin
    Qi, Feng
    Qiu, Xuesong
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 800 - 810
  • [38] Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering
    Dimitriou, Konstantinos
    Roussaki, Ioanna
    SENSORS, 2019, 19 (13):
  • [39] Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection
    Enayati, Saeede
    Goeckel, Dennis
    Houmansadr, Amir
    Pishro-Nik, Hossein
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 20586 - 20601
  • [40] Privacy Enhanced Location Sharing for Mobile Online Social Networks
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Tashakkori, Rahman
    Seo, Jungtaek
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02): : 279 - 290