浏览全部资源
扫码关注微信
1. 贵州大学公共大数据国家重点实验室,贵州 贵阳 550025
2. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
3. 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
4. 女王大学电子和计算机工程学院,安大略 金士顿 ON K7L 3N6
5. 福建师范大学计算机与网络空间安全学院,福建 福州 350117
[ "田有亮(1982– ),男,贵州六盘水人,博士,贵州大学教授、博士生导师,主要研究方向为算法博弈论、密码学与安全协议、大数据安全与隐私保护、区块链与电子货币等" ]
[ "田茂清(1996– ),女,贵州册亨人,贵州大学硕士生,主要研究方向为位置密码学、隐私保护技术等" ]
[ "高鸿峰(1975- ),男,贵州遵义人,贵州大学副教授、硕士生导师,主要研究方向为网络与信息安全" ]
[ "何淼(1988- ),男,四川成都人,女王大学博士生,主要研究方向为信号处理、应用密码学和信息安全等" ]
[ "熊金波(1981- ),男,湖南益阳人,博士,福建师范大学教授、博士生导师,主要研究方向为安全深度学习、移动群智感知、隐私保护技术等" ]
网络出版日期:2022-09,
纸质出版日期:2022-09-25
移动端阅览
田有亮, 田茂清, 高鸿峰, 等. 面向群智感知应用的基于协作的位置认证方案[J]. 通信学报, 2022,43(9):121-133.
Youliang TIAN, Maoqing TIAN, Hongfeng GAO, et al. Cooperation-based location authentication scheme for crowdsensing applications[J]. Journal on communications, 2022, 43(9): 121-133.
田有亮, 田茂清, 高鸿峰, 等. 面向群智感知应用的基于协作的位置认证方案[J]. 通信学报, 2022,43(9):121-133. DOI: 10.11959/j.issn.1000-436x.2022173.
Youliang TIAN, Maoqing TIAN, Hongfeng GAO, et al. Cooperation-based location authentication scheme for crowdsensing applications[J]. Journal on communications, 2022, 43(9): 121-133. DOI: 10.11959/j.issn.1000-436x.2022173.
群智感知利用移动设备收集与位置相关的数据,存在位置欺骗攻击的安全问题,如何保障这些敏感数据的质量成为一个挑战。针对此问题,提出了一种基于协作的位置认证方案来检测提交虚假位置的恶意用户。首先,利用携带移动设备的用户为彼此生成位置证明,利用随机数多次碰撞获取新信息的距离边界协议构造位置认证方案,保证了用户位置的不可伪造,达到提高数据质量的目的。其次,基于区域划分和信誉模型的方法选择位置证明协作者,有效防止了共谋攻击,解决了权益集中的问题。同时,基于信誉值和任务完成时效的激励机制有效提高了协作者完成任务的效率。最后,通过安全性分析和性能评估证明了所提方案的正确性和安全性,以及在计算和通信开销方面的优势。
Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this
a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly
users with mobile devices were used to generate location proofs for each other
and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number
which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition
a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile
the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally
security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure
and the advantages in computational cost and communication overhead.
WANG D X , HUANG C H , SHEN X Y , et al . A general location-authentication based secure participant recruitment scheme for vehicular crowdsensing [J]. Computer Networks , 2020 ,171:107152.
MAISONNEUVE N , STEVENS M , NIESSEN M E , et al . NoiseTube:measuring and mapping noise pollution with mobile phones [C]// Information Technologies in Environmental Engineering . Berlin:Springer , 2009 : 215 - 228 .
CAI J L Z , YAN M Y , LI Y S . Using crowdsourced data in location-based social networks to explore influence maximization [C]// Proceedings of the 35th Annual IEEE International Conference on Computer Communications . Piscataway:IEEE Press , 2016 : 1 - 9 .
ASUQUO P , CRUICKSHANK H , MORLEY J , et al . Security and privacy in location-based services for vehicular and mobile communications:an overview,challenges,and countermeasures [J]. IEEE Internet of Things Journal , 2018 , 5 ( 6 ): 4778 - 4802 .
GUPTA R , RAO U P . An exploration to location based service and its privacy preserving techniques:a survey [J]. Wireless Personal Communications , 2017 , 96 ( 2 ): 1973 - 2007 .
CHERIAN J , LUO J , GUO H L , et al . ParkGauge:gauging the occupancy of parking garages with crowdsensed parking characteristics [C]// Proceedings of 2016 17th IEEE International Conference on Mobile Data Management . Piscataway:IEEE Press , 2016 : 92 - 101 .
GONG W , ZHANG B X , LI C . Location-based online task assignment and path planning for mobile crowdsensing [J]. IEEE Transactions on Vehicular Technology , 2019 , 68 ( 2 ): 1772 - 1783 .
HE W B , LIU X , REN M . Location cheating:a security challenge to location-based social network services [C]// Proceedings of 2011 31st International Conference on Distributed Computing Systems . Piscataway:IEEE Press , 2011 : 740 - 749 .
CHEN Y L , WANG X J , YANG Y L , et al . Location-aware Wi-Fi authentication scheme using smart contract [J]. Sensors , 2020 , 20 ( 4 ): 1062 .
NOSOUHI M R , SOOD K , YU S , et al . PASPORT:a secure and private location proof generation and verification framework [J]. IEEE Transactions on Computational Social Systems , 2020 , 7 ( 2 ): 293 - 307 .
ZHU Z C , CAO G H . APPLAUS:a privacy-preserving location proof updating system for location-based services [C]// Proceedings of IEEE INFOCOM . Piscataway:IEEE Press , 2011 : 1889 - 1897 .
MITROKOTSA A , PERIS-LOPEZ P , DIMITRAKAKIS C , et al . On selecting the nonce length in distance-bounding protocols [J]. The Computer Journal , 2013 , 56 ( 10 ): 1216 - 1227 .
XU G W , LI H W , TAN C , et al . Achieving efficient and privacy-preserving truth discovery in crowd sensing systems [J]. Computers& Security , 2017 , 69 : 114 - 126 .
ZHANG R , ZHANG J X , ZHANG Y C , et al . Secure crowdsourcing-based cooperative pectrum sensing [C]// Proceedings of IEEE INFOCOM . Piscataway:IEEE Press , 2013 : 2526 - 2534 .
PENG D , WU F , CHEN G H . Pay as how well you do:a quality based incentive mechanism for crowdsensing [C]// Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing . New York:ACM Press , 2015 : 177 - 186 .
XIAO M J , AN B Y , WANG J , et al . CMAB-based reverse auction for unknown worker recruitment in mobile crowdsensing [J]. IEEE Transactions on Mobile Computing , 2021 , 21 ( 10 ): 3502 - 3518 .
WU X C , SUN Y E , DU Y , et al . An anti-malicious task allocation mechanism in crowdsensing systems [J]. Future Generation Computer Systems , 2022 , 127 : 347 - 361 .
TALASILA M , CURTMOLA R , BORCEA C . Mobile crowd sensing [M]. Boca Raton : CRC Press , 2015 .
REDDY S , ESTRIN D , SRIVASTAVA M . Recruitment framework for participatory sensing data collections [C]// International Conference on Pervasive Computing . Berlin:Springer , 2010 : 138 - 155 .
HE Z J , CAO J N , LIU X F . High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility [C]// Proceedings of 2015 IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2015 : 2542 - 2550 .
CHANDRAN N , GOYAL V , MORIARTY R , et al . Position based cryptography [C]// Annual International Cryptology Conference . Berlin:Springer , 2009 : 391 - 407 .
YANG R P , XU Q L , AU M H , et al . Position based cryptography with location privacy:a step for fog computing [J]. Future Generation Computer Systems , 2018 , 78 : 799 - 806 .
BRANDS S , CHAUM D . Distance-bounding protocols [C]// Workshop on the Theory and Application of of Cryptographic Techniques . Berlin:Springer , 1993 : 344 - 359 .
WANG X L , PANDE A , ZHU J D , et al . STAMP:enabling privacy-preserving location proofs for mobile users [J]. IEEE/ACM Transactions on Networking , 2016 , 24 ( 6 ): 3276 - 3289 .
ZHU Z C , CAO G H . Toward privacy preserving and collusion resistance in a location proof updating system [J]. IEEE Transactions on Mobile Computing , 2013 , 12 ( 1 ): 51 - 64 .
LIU S S , YAN Z , KANTOLA R . Privacy-preserving D2D cooperative location verification [C]// Proceedings of 2021 IEEE Global Communications Conference . Piscataway:IEEE Press , 2021 : 1 - 6 .
KOUNAS D , VOUTYRAS O , PALAIOKRASSAS G , et al . QuietPlace:an ultrasound-based proof of location protocol with strong identities [J]. Applied System Innovation , 2020 , 3 ( 2 ): 19 .
GAMBS S , KILLIJIAN M O , ROY M , et al . PROPS:a PRivacy-preserving location proof system [C]// Proceedings of 2014 IEEE 33rd International Symposium on Reliable Distributed Systems . Piscataway:IEEE Press , 2014 : 1 - 10 .
DESMEDT Y , . Major security problems with the ‘unforgeable’(feige)fiat-shamir proofs of identity and how to overcome them [C]// Proceedings of SECURICOM .[S.l.:s.n.], 1988 : 15 - 17 .
BAGGA P , DAS A K , WAZID M , et al . On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system [J]. IEEE Transactions on Vehicular Technology , 2021 , 70 ( 2 ): 1736 - 1751 .
0
浏览量
813
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构