物联网正在改变消费者的行为和业务流程.针对物联网设备的信息隐私及安全问题,提出基于区块链技术的物联网设备位置信息保护模型.该模型首先借助区块链技术将记录设备标识,保证物联网设备信息不可篡改;然后基于白名单技术实现分布式哈希表网络,并对设备位置信息进行异或处理以隐藏物联网的网络拓扑,保护物联网设备的位置信息;最后根据k-匿名算法泛化数据的敏感属性为用户提供区域信息统计服务.实验结果证明该模型可以有效隐藏设备位置信息,同时能够提供定制的区域统计服务并且保护用户信息安全.
The Internet of Things (IoT) is changing people's consuming behavior and business processes. Aiming at the information privacy and security of IoT devices, this paper proposes a location information protection model for IoT devices based on blockchain technology. Firstly, this model records device identification with the help of blockchain technology to ensure that the information of IoT devices cannot be tampered. Then the distributed Hash table (DHT) network is implemented based on white list technology and the device location information is XOR processed to hide the network topology of the IoT. Finally, the sensitive attributes of the data are generalized according to k-anonymous algorithm to provide users with regional information statistics services. The experimental results show that the model can effectively hide device location information, provide customized regional statistics service and protect user information security.
[1] Albino V, Berardi U, Dangelico R M. Smart cities:definitions, dimensions, performance, and initiatives[J]. Journal of Urban Technology, 2015, 22(1):3-21.
[2] Mukhopadhyay S C. Wearable sensors for human activity monitoring:a review[J]. IEEE Sensors Journal, 2014, 15(3):1321-1330.
[3] Weber R H. Internet of Things-new security and privacy challenges[J]. Computer Law&Security Review, 2010, 26(1):23-30.
[4] Zhang Z K, Cho M C Y, Wang C W, et al. IoT security:ongoing challenges and research opportunities[C]//2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE, 2014:230-234.
[5] Durden T. Wikileaks Unveils' Vault 7':The Largest Ever Publication of Confidential CIA Documents; Another Snowden Emerges."by Zerohedge. Mar (2017).
[6] Yu M, Zhang J, Wang J, et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain[J]. International Journal of Distributed Sensor Networks, 2018, 14(12):1550147718815842.
[7] Liu H, Li X H, Pei B, et al. Distributed k-anonymous location privacy protection scheme based on blockchain[J/OL]. Chinese Journal of Computers, 2019, 42(5):942-960.
[8] Yin C, Xi J, Sun R, et al. Location privacy protection based on differential privacy strategy for big data in industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2017, 14(8):3628-3636.
[9] Crosby M. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016, 71(2):6-10.
[10] Konstantinos C, Devetsikiotis M. Blockchains and smart contracts for the Internet of Things[J]. IEEE Access, 2016, 4(5-10):2292-2303.
[11] Kosba A, Miller A, Shi E, et al. Hawk:the blockchain model of cryptography and privacypreserving smart contracts[C]//2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016:839-858.
[12] Maymounkov P, Mazieres D. Kademlia:a peer-to-peer information system based on the XOR metric[C]//International Workshop on Peer-to-Peer Systems. Berlin, Heidelberg:Springer, 2002:53-65.
[13] Crosby S A, Wallach D S. An analysis of bittorrent's two Kademlia-based dhts[R]. 2007.
[14] Moritz S, En-Najjary T, Biersack E W. A global view of kad,[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 2007:117-122.
[15] Kim S K, Ma Z, Murali S, et al. Measuring Ethereum network peers[C]//Proceedings of the Internet Measurement Conference, 2018. ACM, 2018:91-104.
[16] Starnberger G, Kruegel C, Kirda E. Overbot:a botnet protocol based on Kademlia[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM, 2008:13.
[17] Niu B, Li Q, Zhu X, et al. Achieving k-anonymity in privacy-aware location-based services[C]//IEEE Conference on Computer Communications. IEEE, 2014:754-762.
[18] Sweeney L. k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570.
[19] Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):571-588.
[20] Wang S, Hu Q, Sun Y, et al. Privacy preservation in location-based services[J]. IEEE Communications Magazine, 2018, 56(3):134-140.