Abstract
The 5G IoT (Internet of Things, IoT) is easier to implement in location privacy-preserving research. The terminals in distributed network architecture blur their accurate locations into a spatial cloaking region but most existing spatial cloaking algorithms cannot work well because of man-in-the-middle attacks, high communication overhead, time consumption, and the lower success rate. This paper proposes an algorithm that can recommend terminal's privacy requirements based on getting terminal distribution information in the neighborhood after cross-layer authentication and therefore help 5G IoT terminals find enough collaborative terminals safely and quickly. The approach shows it can avoid man-in-the-middle attacks and needs lower communication costs and less searching time than 520ms at the same time. It has a great anonymization success rate by 93% through extensive simulation experiments for a range of 5G IoT scenarios.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.