|Table of Contents|

Geography location privacy protection based on secure network coding for mobile networks(PDF)

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2018年01期
Page:
56-
Research Field:
Publishing date:

Info

Title:
Geography location privacy protection based on secure network coding for mobile networks
Author(s):
Wang Lei12Sun Zhongwei1
1.School of Computer; 2.Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
Keywords:
secure network coding location-based service privacy protection linear coding
PACS:
TP391
DOI:
10.14177/j.cnki.32-1397n.2018.42.01.008
Abstract:
When the users require location-based service(LBS),they have to send their position to the service providers. In order to protect this privacy information,this paper proposes to use secure network coding in order to protect this kind of privacy information. The users linearly encode the location information with secure network coding,and send the encoded data to the servers. Only after the servers receive enough linearly independent data,can it decode the original locations and provide service for the users. In the process,the servers cannot know the exact position of each user. The experimental result shows that the proposed scheme can increase the security when users request LBS.

References:

[1] Wang Y,Xu D,He X,et al. L2p2:Location-aware location privacy protection for location-based services[C]//Proceedings of IEEE INFOCOM 2012. Orlando,Florida,USA:IEEE,2012:1996-2004. [2]Liu X,Zhao H,Pan M,et al. Traffic-aware multiple mix zone placement for protection location privacy[C]//Proceedings of IEEE INFOCOM 2012. Orlando,Florida,USA:IEEE,2012:972-980. [3]王敏君,李千目. 移动定位社交服务下的位置隐私保护方法[J]. 南京理工大学学报,2016,40(1):17-23. Wang Minjun,Li Qianmu. Location privacy protection in location-based social networking services[J]. Journal of Nanjing University of Science and Technology,2016,40(1):17-23. [4]Chen D,Zhang P,Hu C,et al. PAPERS:Private and precise range search for location based services[C]//2015 IEEE International Conference on Communica-tions. London,UK:IEEE,2015:7347-7352. [5]Ahlswede R,Cai N,Li S Y,et al. Network information flow[J]. IEEE Transactions on Information Theory,2000,46(4):1204-1216. [6]Ho T,Médard M,Koetter R,et al. A random linear network coding approach to multicast[J]. IEEE Transactions on Information Theory,2006,52(10):4413-4430. [7]Jaggi S,Sanders P,Chou P A,et al. Polynomial time algorithms for multicast network code construction[J]. IEEE Transactions on Information Theory,2005,51(6):1973-1982. [8]刘西蒙,刘光军,马建峰,等. 可伸缩视频流的安全网络编码方案[J]. 通信学报,2013,34(5):184-191. Liu Ximeng,Liu Guangjun,Ma Jianfeng,et al. Secure network coding scheme for scalable video streaming,Journal on Communications,2013,34(5):184-191 [9]Rashmi K V,Shah N B,Ramchandran K,et al. Regenerating codes for errors and erasures in distributed storage[C]//Information Theory Proceedings(ISIT),2012 IEEE International Symposium on. Cambridge,MA:IEEE,2012:1202-1206. [10]Wang L,Yang Z,Xu L,et al,NCVCS:Network-coding-based video conference system for mobile devices in multicast networks[J]. Ad Hoc Networks,2016,45:13-21. [11]Yang Y,Zhong C,Sun Y,et al. Network coding based reliable disjoint and braided multipath routing for sensor networks[J]. Journal of Network and Computer Applications,2010,33(4):422-432. [12]Cai N,Yeung R W. Secure network coding[C]//Information Theory,2002. Proceedings. 2002 IEEE International Symposium on. IEEE,2002:323. [13]Chen F,Xiang T,Yang Y,et al. Secure cloud storage meets with secure network coding[J]. IEEE Transactions on Computers,2016,65(6):1936-1948. [14]Ferreira D,Costa R A,Barros J. Real-time network coding for live streaming in hyper-dense WiFi spaces[J]. IEEE Journal on Selected Areas in Communications,2014,32(4):773-781. [15]Xie L F,Chong P H J,Ho I W H,et al,Virtual overhearing:An effective way to increase network coding opportunities in wireless ad-hoc networks[J]. Computer Networks,2016,105:111-123. [16]Kido H,Yanagisawa Y,Satoh T. Protection of location privacy using dummies for location-based services[C]//Data Engineering Workshops,2005. 21st International Conference on. IEEE,2005:1248-1248.

Memo

Memo:
-
Last Update: 2018-02-28