Abstract

The emergence of mobile Internet of Things (IoT) has brought much more convenience to our daily life than ever before, modern intelligent vehicles are usually equipped with various mobile IoT components or devices. However, when we are enjoying the convenience from the rapid development of mobile IoT services, our privacy can be misused by attackers in an easier way. In this paper, we devise a query scheme with intelligent vehicle privacy guarantees, which enables a vehicle to acquire accurate query service from the service provider (SP) without providing its explicit private information, such as location or query interest privacy. And more than that, we introduce network coding for the first time to make our scheme applicable to a more sophisticated top-K query by multiple vehicles cooperation in mobile IoT. Furthermore, we also consider the unnecessary reveal issue of service data at SP side since the data is its asset. Performance analysis and experiments verify the validity of our scheme and demonstrate a better accuracy and efficiency compared with existing solutions in mobile IoT scenario.

Highlights

  • To preserve the vehicle’s privacy and service provider (SP)’s data security, the vehicle initially carries out the oblivious transfer protocol to insensibly acquire the unique symmetric key kij of its desired places of interest (PoI) in TABLE 2 and without revealing any other PoI record stored in the SP or the location and interest privacy of the vehicle

  • Aiming at mobile Internet of Things (IoT) scenario in road networks, we propose an oblivious transfer (OT) protocol based on Elgamal cryptosystem [35], which works between vehicles and SP in our query scheme with SP data and vehicle privacy preservation

  • QUERY ACCURACY Vehicles are capable to obtain accurate top-K PoIs according to its interest, which are arranged and stored in advance in the data structure of TABLE 2, it implies the top-K PoIs are the nearest ones along road segments without blockages in mobile IoT scenario rather than the Euclidean space, such as building blockage, road restrictions

Read more

Summary

INTRODUCTION

With explosively emerging of mobile Internet of Things, numerous smart components are equipped on mobile IoT terminals, such as intelligent vehicles, wearable electronics and smart phones, these mobile terminals usually cooperate with each other to collect, process and transmit data of users, which is the most popular application in our daily life [1]. Two practical PIR schemes [3], [4] have been devised in Euclidean space with divided cells, both of which make good use of the homomorphic properties [29], [30] of public key cryptosystems [28], [31], but they obviously have the distance inaccuracy issue due to building blockage in a real mobile scenario, and the vehicle can be identified in a particular cell risking location privacy disclosure, and querying in a cell gives rise to more extensive searching area with too much additional processing overhead. An intermediate node is a sink node in a mobile sensor network, such as a roadside unit or a base station, it recodes the interest packets from vehicles and outputs one combination for sake of achieving the top-K query and privacy preservation in our scheme and it transmits the combination to SP to rank the PoI records in the database of SP. They could collude with some vehicles and launch traffic analysis attacks in the NC phase

NETWORK CODING
OUR OT PROTOCOL
IMPLEMENTATION OF THE TOP-K QUERY
EXPERIMENTS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.