To Hide Private Position Information in Localization for Internet of Underwater Things

被引:18
作者
Yan, Jing [1 ]
Meng, Yuan [1 ]
Luo, Xiaoyuan [1 ]
Guan, Xinping [2 ]
机构
[1] Yanshan Univ, Inst Elect Engn, Qinhuangdao 066004, Hebei, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200240, Peoples R China
关键词
Location awareness; Clocks; Privacy; Synchronization; Protocols; Internet of Things; Encryption; Asynchronous; Internet of Underwater Things (IoUT); localization; privacy preservation; stratification; ASYNCHRONOUS LOCALIZATION; JOINT LOCALIZATION; SENSOR NETWORKS; SECURITY; AUV; SYNCHRONIZATION; ALGORITHM; PROTOCOL; SECRECY;
D O I
10.1109/JIOT.2021.3068298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving localization for Internet of Underwater Things (IoUT) plays a fundamental role in the sensing, communication and control of ocean environments. However, the unique characteristics of underwater environment make it much more difficult to achieve such a task. In this article, we are concerned with a privacy-preserving localization issue for IoUT, subjected to asynchronous clock, stratification effect and forging attack in cyber channels. In order to eliminate the influence of asynchronous clock and hide the private position information, we develop a privacy-preserving asynchronous transmission protocol, where a received signal strength (RSS)-based detection strategy is given to detect the malicious anchor nodes. Based on this, a least squares estimator is designed to estimate the position information of target. Particularly, a ray compensation strategy is incorporated into the localization estimator, such that the localization bias from assuming the straight-line transmission can be avoided. It is worth mentioning that, the proposed localization solution in this article can not only hide the private position information, but also eliminate the influences of asynchronous clock, stratification effect and forging attack. Finally, simulation and experiment results are conducted to reveal that the proposed localization solution outperforms the other existing works in terms of localization accuracy and effectiveness.
引用
收藏
页码:14338 / 14354
页数:17
相关论文
共 52 条
  • [1] An Obfuscation-Based Approach for Protecting Location Privacy
    Ardagna, Claudio A.
    Cremonini, Marco
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) : 13 - 27
  • [2] Enabling Optimization-Based Localization for IoT Devices
    Beuchat, Paul N.
    Hesse, Henrik
    Domahidi, Alexander
    Lygeros, John
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 5639 - 5650
  • [3] Bo Guan, 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), P476, DOI 10.1109/MILCOM47813.2019.9020731
  • [4] Buccafurri F, 2009, P INT C PERV TECHN R, P1
  • [5] An overview of the internet of underwater things
    Carmen Domingo, Mari
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1879 - 1890
  • [6] On-Demand Asynchronous Localization for Underwater Sensor Networks
    Carroll, Patrick
    Mahmood, Kaleel
    Zhou, Shengli
    Zhou, Hao
    Xu, Xiaoka
    Cui, Jun-Hong
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (13) : 3337 - 3348
  • [7] Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks
    Chen, YanKun
    Ji, Fei
    Guan, Quansheng
    Wang, Yide
    Chen, Fangjiong
    Yu, Hua
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1185 - 1192
  • [8] Silent positioning in underwater acoustic sensor networks
    Cheng, Xiuzhen
    Shu, Haining
    Liang, Qilian
    Du, David Hung-Chang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (03) : 1756 - 1766
  • [9] A novel opportunistic power controlled routing protocol for internet of underwater things
    Coutinho, Rodolfo W. L.
    Boukerche, Azzedine
    Loureiro, Antonio A. F.
    [J]. COMPUTER COMMUNICATIONS, 2020, 150 : 72 - 82
  • [10] Privacy-aware contextual localization using network traffic analysis
    Das, Aveek K.
    Pathak, Parth H.
    Chuah, Chen-Nee
    Mohapatra, Prasant
    [J]. COMPUTER NETWORKS, 2017, 118 : 24 - 36