区块链

基于区块链的物联网节点位置隐私保护模型

展开
  • 1. 郑州大学 软件学院, 郑州 450001;
    2. 郑州大学 互联网医疗与健康服务河南省协同创新中心, 郑州 450001
刘炜,副教授,研究方向为网络性能优化、网络安全、互联网医疗.E-mail:wliu@ha.edu.cn

收稿日期: 2019-10-30

  网络出版日期: 2020-01-19

基金资助

国家重点研究开发项目基金(No.SQ2018YFB1201403);河南省高等学校重点科研项目基金(No.20A520035);河南省高等学校青年骨干教师基金(No.2019GGJS018);赛尔创新项目基金(No.NGII20180702)资助

Location Information Protection Model for IoT Nodes Based on Blockchain

Expand
  • 1. School of Software Technology, Zhengzhou University, Zhengzhou 450001, China;
    2. Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou 450001, China

Received date: 2019-10-30

  Online published: 2020-01-19

摘要

物联网正在改变消费者的行为和业务流程.针对物联网设备的信息隐私及安全问题,提出基于区块链技术的物联网设备位置信息保护模型.该模型首先借助区块链技术将记录设备标识,保证物联网设备信息不可篡改;然后基于白名单技术实现分布式哈希表网络,并对设备位置信息进行异或处理以隐藏物联网的网络拓扑,保护物联网设备的位置信息;最后根据k-匿名算法泛化数据的敏感属性为用户提供区域信息统计服务.实验结果证明该模型可以有效隐藏设备位置信息,同时能够提供定制的区域统计服务并且保护用户信息安全.

本文引用格式

佘维, 陈建森, 顾志豪, 田钊, 徐力, 刘炜 . 基于区块链的物联网节点位置隐私保护模型[J]. 应用科学学报, 2020 , 38(1) : 139 -151 . DOI: 10.3969/j.issn.0255-8297.2020.01.011

Abstract

The Internet of Things (IoT) is changing people's consuming behavior and business processes. Aiming at the information privacy and security of IoT devices, this paper proposes a location information protection model for IoT devices based on blockchain technology. Firstly, this model records device identification with the help of blockchain technology to ensure that the information of IoT devices cannot be tampered. Then the distributed Hash table (DHT) network is implemented based on white list technology and the device location information is XOR processed to hide the network topology of the IoT. Finally, the sensitive attributes of the data are generalized according to k-anonymous algorithm to provide users with regional information statistics services. The experimental results show that the model can effectively hide device location information, provide customized regional statistics service and protect user information security.

参考文献

[1] Albino V, Berardi U, Dangelico R M. Smart cities:definitions, dimensions, performance, and initiatives[J]. Journal of Urban Technology, 2015, 22(1):3-21.
[2] Mukhopadhyay S C. Wearable sensors for human activity monitoring:a review[J]. IEEE Sensors Journal, 2014, 15(3):1321-1330.
[3] Weber R H. Internet of Things-new security and privacy challenges[J]. Computer Law&Security Review, 2010, 26(1):23-30.
[4] Zhang Z K, Cho M C Y, Wang C W, et al. IoT security:ongoing challenges and research opportunities[C]//2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE, 2014:230-234.
[5] Durden T. Wikileaks Unveils' Vault 7':The Largest Ever Publication of Confidential CIA Documents; Another Snowden Emerges."by Zerohedge. Mar (2017).
[6] Yu M, Zhang J, Wang J, et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain[J]. International Journal of Distributed Sensor Networks, 2018, 14(12):1550147718815842.
[7] Liu H, Li X H, Pei B, et al. Distributed k-anonymous location privacy protection scheme based on blockchain[J/OL]. Chinese Journal of Computers, 2019, 42(5):942-960.
[8] Yin C, Xi J, Sun R, et al. Location privacy protection based on differential privacy strategy for big data in industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2017, 14(8):3628-3636.
[9] Crosby M. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016, 71(2):6-10.
[10] Konstantinos C, Devetsikiotis M. Blockchains and smart contracts for the Internet of Things[J]. IEEE Access, 2016, 4(5-10):2292-2303.
[11] Kosba A, Miller A, Shi E, et al. Hawk:the blockchain model of cryptography and privacypreserving smart contracts[C]//2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016:839-858.
[12] Maymounkov P, Mazieres D. Kademlia:a peer-to-peer information system based on the XOR metric[C]//International Workshop on Peer-to-Peer Systems. Berlin, Heidelberg:Springer, 2002:53-65.
[13] Crosby S A, Wallach D S. An analysis of bittorrent's two Kademlia-based dhts[R]. 2007.
[14] Moritz S, En-Najjary T, Biersack E W. A global view of kad,[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 2007:117-122.
[15] Kim S K, Ma Z, Murali S, et al. Measuring Ethereum network peers[C]//Proceedings of the Internet Measurement Conference, 2018. ACM, 2018:91-104.
[16] Starnberger G, Kruegel C, Kirda E. Overbot:a botnet protocol based on Kademlia[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM, 2008:13.
[17] Niu B, Li Q, Zhu X, et al. Achieving k-anonymity in privacy-aware location-based services[C]//IEEE Conference on Computer Communications. IEEE, 2014:754-762.
[18] Sweeney L. k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570.
[19] Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):571-588.
[20] Wang S, Hu Q, Sun Y, et al. Privacy preservation in location-based services[J]. IEEE Communications Magazine, 2018, 56(3):134-140.
文章导航

/