Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorLiu, Shushuen_US
dc.contributor.authorYan, Zhengen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.contributor.groupauthorNetwork Security and Trusten
dc.date.accessioned2022-04-19T18:32:09Z
dc.date.available2022-04-19T18:32:09Z
dc.date.issued2022-10-01en_US
dc.descriptionPublisher Copyright: IEEE
dc.description.abstractHigh-accuracy positioning has drawn huge attention with the potential in enhancing location-aware communications, intelligent transportation, and so on. The emergency of the fifth-generation (5G) technologies like device to device (D2D) communications, vehicle to vehicle (V2V) communications and crowdsourcing networks is expected to help achieve highly accurate positioning. By employing nearby mobile terminals to estimate position cooperatively, these technologies can improve positioning accuracy effectively, especially in indoor and urban areas. Despite the benefit, the potential information disclosure in these positioning systems threatens the engagement of public participants (also known as reference points). The location of the reference points and their distances to a target point is quite sensitive since they can be easily used to locate the reference points once exposed. Though existing solutions based on Paillier homomorphic encryption have been proposed to preserve the privacy of distance information. The sensitivity of reference points’ locations is ignored. Additionally, the adoption of Paillier introduces a high computation cost, which is impractical in reality. To address the above problems, this paper proposes two efficient protocols, named Pub-pos and Pri-pos. By leveraging matrix concatenation and multiplication, these two protocols can disguise the original sensitive data, including both distance and location information, into a random matrix while keeping a positioning result intact. We analyze security strength, complexity and optimal variable selection of the proposed protocols. Numerous experiments verify that our proposed protocols have significant efficiency improvement in both system and individual levels compared with a Paillier based solution.en
dc.description.versionPeer revieweden
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationLiu, S & Yan, Z 2022, ' Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT ', IEEE Internet of Things Journal, vol. 9, no. 19, pp. 18527-18538 . https://doi.org/10.1109/JIOT.2022.3161148en
dc.identifier.doi10.1109/JIOT.2022.3161148en_US
dc.identifier.issn2327-4662
dc.identifier.otherPURE UUID: 5561e0d3-9f86-4a6c-a82a-de7fae7ac863en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/5561e0d3-9f86-4a6c-a82a-de7fae7ac863en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85127061451&partnerID=8YFLogxKen_US
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/81819862/Liu_Efficient_Privacy_Protection_Protocols_for_5G.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/113954
dc.identifier.urnURN:NBN:fi:aalto-202204192827
dc.language.isoenen
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Internet of Things Journalen
dc.rightsopenAccessen
dc.subject.keyword5Gen_US
dc.subject.keywordCloud Computing.en_US
dc.subject.keywordD2D Communicationsen_US
dc.subject.keywordD2D Positioningen_US
dc.subject.keywordLocation Privacy Protectionen_US
dc.subject.keywordV2Ven_US
dc.titleEfficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoTen
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionacceptedVersion

Files