The New Method of Sensor Data Privacy Protection for IoT

被引:2
|
作者
Wu, Yue [1 ,2 ,3 ]
Song, Liangtu [1 ,2 ,3 ]
Liu, Lei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Intelligent Machines, Hefei 230031, Anhui, Peoples R China
[2] Chinese Acad Sci, Hefei Inst Phys Sci, Hefei 230031, Anhui, Peoples R China
[3] Univ Sci & Technol China, Hefei 230026, Anhui, Peoples R China
关键词
BLOCKCHAIN; SECURITY; INTERNET; THINGS; SYSTEM;
D O I
10.1155/2021/3920579
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a block, and submits the block chain transaction. In order to avoid tracking the source of the data, a ring signature is used to anonymize the gateway transaction. The proxy re-encryption method realizes the sharing of encrypted data. On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. Through experiments, the effects of sensor/gateway verification, transaction signatures, and sensor data encryption on performance are discussed. The results show that transaction delays are all controlled within a reasonable range. The system performance achieved by this method is also relatively stable.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
    Zhang, Guoyin
    Kou, Liang
    Zhang, Liguo
    Liu, Chao
    Da, Qingan
    Sun, Jianguo
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [22] Privacy-protection technologies for secure utilization of sensor data
    Fujitsu Laboratories Ltd., Japan
    Fujitsu Sci Tech J, 1 (30-33):
  • [23] Privacy-protection Technologies for Secure Utilization of Sensor Data
    Izu, Tetsuya
    Ito, Koichi
    Tsuda, Hiroshi
    Abiru, Kenichi
    Ogura, Takao
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 30 - 33
  • [24] Privacy Protection of Node Location and Data in Wireless Sensor Networks
    Huan, He
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 34 - 39
  • [25] Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering
    Dimitriou, Konstantinos
    Roussaki, Ioanna
    SENSORS, 2019, 19 (13):
  • [26] Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
    Liu, Qingzhi
    Huang, Yuchen
    Jin, Chenglu
    Zhou, Xiaohan
    Mao, Ying
    Catal, Cagatay
    Cheng, Long
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (06)
  • [27] Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain
    Li, Wenmin
    Chen, Yang
    Gao, Fei
    Zhang, Shuo
    Zhang, Hua
    Wen, Qiaoyan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12090 - 12101
  • [28] An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
    Gehrmann, Christian
    Gunnarsson, Martin
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5744 - 5753
  • [29] Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT
    Li, Fenghua
    Li, Hui
    Wang, Cong
    Ren, Kui
    Bertino, Elisa
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1446 - 1449
  • [30] A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation
    Zhang, Lei
    Huo, Yu
    Ge, Qiang
    Ma, Yuxiang
    Liu, Qiqi
    Ouyang, Wenlei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021