P3S: Pertinent Privacy-Preserving Scheme for Remotely Sensed Environmental Data in Smart Cities

被引:8
作者
Algarni, Fahad [1 ]
Khan, Mohammad Ayoub [1 ]
Alawad, Wedad [2 ]
Halima, Nadhir Ben [3 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[2] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51921, Saudi Arabia
[3] Community Coll Qatar, Dept Informat Technol, Doha, Qatar
关键词
Authentication; Security; Remote sensing; Data privacy; Sensors; Privacy; Protocols; Big Data; data privacy; machine learning; privacy preserving; remote sensing; smart city;
D O I
10.1109/JSTARS.2023.3288743
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sensing devices, high-performance networking, and privacy preservation algorithms have important roles to play in remotely sensed environmental data in smart cities. The data generated by these sensors are heterogeneous, vast, and sensitive. Therefore, it is imperative that adequate security mechanisms are put in place to protect environmental data from privacy breaches and malicious attacks, remotely sensed environmental data, such as weather conditions (windy, cloudy, or rainy), soil types, and other similar data, must be protected. The biggest risks of remotely connected devices are that sensitive information could be leaked and devices could be compromised. Considering these security threats, this article proposes a pertinent privacy-preserving scheme. The presented scheme is reliable for sensitive geosensed data in thwarting the aforementioned security issues. The data are concealed using two-factor authentication from the transmitter end. In this authentication, the signatures of device and receiver are overlapped for improved authentication. The failure in overlapping is identified by delayed signing time and noncoherent agreements. This identification is recurrently analyzed using federated learning. Therefore, the signing process is paused until the device verification is performed. Hence, if the device verification succeeds, then a new data privacy accumulation session is introduced. Contrarily, the accumulation is dropped, preventing compromised actual data from preserving accuracy. In two-factor authentication, lightweight digital signing cryptography is utilized. The proposed scheme maximizes the average authentication success rate and average overlapping factor by 8.86% and 12.20%, respectively. This scheme further reduces average authentication time, false data, and verification time by 10.14%, 9.70%, and 10.19%, respectively.
引用
收藏
页码:5905 / 5918
页数:14
相关论文
共 30 条
  • [1] Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution
    Brahem, Mariem
    Scerri, Guillaume
    Anciaux, Nicolas
    Issarny, Valerie
    [J]. PERVASIVE AND MOBILE COMPUTING, 2022, 83
  • [2] Automatic Registration of Remote Sensing Images Based on Revised SIFT With Trilateral Computation and Homogeneity Enforcement
    Chang, Herng-Hua
    Chan, Wan-Chen
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2021, 59 (09): : 7635 - 7650
  • [3] Privacy-preserving task allocation for edge computing-based mobile crowdsensing
    Ding, Xuyang
    Lv, Ruizhao
    Pang, Xiaoyi
    Hu, Jiahui
    Wang, Zhibo
    Yang, Xu
    Li, Xiong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [4] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    [J]. INTERNET OF THINGS, 2020, 9
  • [5] Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Xian-Ming
    Ding, Derui
    Yang, Fuwen
    [J]. INFORMATION SCIENCES, 2020, 512 : 1592 - 1605
  • [6] Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement
    Hu, Xiaoyan
    Song, Xiaoyi
    Cheng, Guang
    Wu, Hua
    Gong, Jian
    [J]. COMPUTER COMMUNICATIONS, 2022, 194 : 44 - 54
  • [7] Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection
    Huang, Yiting
    Yu, Yong
    Li, Huilin
    Li, Yannan
    Tian, Aikui
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 604 - 613
  • [8] Modeling and Predicting Land Use Land Cover Spatiotemporal Changes: A Case Study in Chalus Watershed, Iran
    Jalayer, Sepideh
    Sharifi, Alireza
    Abbasi-Moghadam, Dariush
    Tariq, Aqil
    Qin, Shujing
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2022, 15 : 5496 - 5513
  • [9] Incorporation of machine learning and deep neural network approaches into a remote sensing-integrated crop model for the simulation of rice growth
    Jeong, Seungtaek
    Ko, Jonghan
    Shin, Taehwan
    Yeom, Jong-min
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [10] kaggle, DAIL CLIM TIM SER DA