Font Size: a A A

Research On Privacy Security Model Of LBS In The Internet Of Things

Posted on:2013-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:H LuFull Text:PDF
GTID:2248330371992210Subject:Education Technology
Abstract/Summary:PDF Full Text Request
Location Based Service in the Internet of Things (IOT) is becoming one of the most important mobile applications for people’s daily life and entertainment. But due to the security vulnerability of wireless sensor networks, mobile networks, mobile devices and RFID label, it makes LBS in IOT faces more serious privacy threat, such as activities track, behavior way, living habit, identity, position of users. The exciting ways of protecting privacy are not suitable for protecting privacy of LBS in IOT. On the one hand, they failed to solve privacy problems in the environment of relatively sparse distribution, and they also failed to protect sensitive data in IOT. On the other hand, they did not support LBS server operating enciphered data directly, and caused privacy data of LBS can be malicious used by service providers or be stolen by network attacks. Therefore, based on analyzing the architecture of IOT and LBS system, they are studied that the structure of LBS system in IOT and its security needs for several privacy threats, and a security model for LBS in IOT is proposed.Main work is reflected in the following aspects:(1) Architecture and application of LBS in IOTThe integration of IOT and LBS has become an inevitable trend of the current location-related services. First, we analyzed the architecture of LBS in the Internet of things. Second, according to the difference of service object and service mode, we explore new applications of LBS in IOT.(2) Privacy issues and security requirements of LBS in IOTAccording to the structure, the involving key technology and the type of service in the process of LBS application, the privacy security problems were explored and proposed the security needs.(3) Privacy security model of LBS in IOTFirst, we analyzed the typical models of privacy protection and discussed the basic principles of its implementation and its advantages and disadvantages. Then, the shortcomings of existing model algorithm and the actual demand of LBS services in IOT is discussed. On the one hand, we introduced an improved fuzzy algorithm for finding optimal fuzzy spaces. It also has very good protection effect in relatively sparse environment. On the other hand, it also increase a new method that homomorphism cryptograph realize service content protection. Finally, according to the targeted algorithm and its advantages and disadvantages, we design a kind of privacy protection model. This model can meet the service of anonymous and anonymous. (4) Experimental analysisWe use the network-based generator of moving objects simulator to simulate the actual application scene. Then, the accuracy and validity of the security model is analyzed. The experiment proved that we design privacy security model conforms to the basic requirements of LBS service privacy protection in the internet of things. This model not only can improve the privacy protection of LBS, but also can balance the contradiction between service quality and privacy protection.
Keywords/Search Tags:Internet of Things (IOT), LBS, privacy security, position fuzzy, homomorphic cryptograph
PDF Full Text Request
Related items