Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Liu, Shushu | en_US |
dc.contributor.author | Yan, Zheng | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.groupauthor | Network Security and Trust | en |
dc.date.accessioned | 2022-04-19T18:32:09Z | |
dc.date.available | 2022-04-19T18:32:09Z | |
dc.date.issued | 2022-10-01 | en_US |
dc.description | Publisher Copyright: IEEE | |
dc.description.abstract | High-accuracy positioning has drawn huge attention with the potential in enhancing location-aware communications, intelligent transportation, and so on. The emergency of the fifth-generation (5G) technologies like device to device (D2D) communications, vehicle to vehicle (V2V) communications and crowdsourcing networks is expected to help achieve highly accurate positioning. By employing nearby mobile terminals to estimate position cooperatively, these technologies can improve positioning accuracy effectively, especially in indoor and urban areas. Despite the benefit, the potential information disclosure in these positioning systems threatens the engagement of public participants (also known as reference points). The location of the reference points and their distances to a target point is quite sensitive since they can be easily used to locate the reference points once exposed. Though existing solutions based on Paillier homomorphic encryption have been proposed to preserve the privacy of distance information. The sensitivity of reference points’ locations is ignored. Additionally, the adoption of Paillier introduces a high computation cost, which is impractical in reality. To address the above problems, this paper proposes two efficient protocols, named Pub-pos and Pri-pos. By leveraging matrix concatenation and multiplication, these two protocols can disguise the original sensitive data, including both distance and location information, into a random matrix while keeping a positioning result intact. We analyze security strength, complexity and optimal variable selection of the proposed protocols. Numerous experiments verify that our proposed protocols have significant efficiency improvement in both system and individual levels compared with a Paillier based solution. | en |
dc.description.version | Peer reviewed | en |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Liu, S & Yan, Z 2022, ' Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT ', IEEE Internet of Things Journal, vol. 9, no. 19, pp. 18527-18538 . https://doi.org/10.1109/JIOT.2022.3161148 | en |
dc.identifier.doi | 10.1109/JIOT.2022.3161148 | en_US |
dc.identifier.issn | 2327-4662 | |
dc.identifier.other | PURE UUID: 5561e0d3-9f86-4a6c-a82a-de7fae7ac863 | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/5561e0d3-9f86-4a6c-a82a-de7fae7ac863 | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85127061451&partnerID=8YFLogxK | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/81819862/Liu_Efficient_Privacy_Protection_Protocols_for_5G.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/113954 | |
dc.identifier.urn | URN:NBN:fi:aalto-202204192827 | |
dc.language.iso | en | en |
dc.publisher | IEEE | |
dc.relation.ispartofseries | IEEE Internet of Things Journal | en |
dc.rights | openAccess | en |
dc.subject.keyword | 5G | en_US |
dc.subject.keyword | Cloud Computing. | en_US |
dc.subject.keyword | D2D Communications | en_US |
dc.subject.keyword | D2D Positioning | en_US |
dc.subject.keyword | Location Privacy Protection | en_US |
dc.subject.keyword | V2V | en_US |
dc.title | Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT | en |
dc.type | A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä | fi |
dc.type.version | acceptedVersion |