Font Size: a A A

The Research Of Location Privacy Protection In P2P Network Mode Based On Internet Of Things

Posted on:2014-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:J Q ShiFull Text:PDF
GTID:2248330395983795Subject:Information security
Abstract/Summary:PDF Full Text Request
With the booming development of some technologies in the field of Internet of Things, peopleare going to pay more attentation on Lacation Based Service, one of the applications of Internet ofThings. Because of the limitation of wireless sensor network, mobile communication network andmobile terminal equipment technology, there are many challenages on the location privacypreservation.This paper assumes that there are some monitor nodes distributed by the attacker on the P2Pnetwork model. Aiming to protect the exact location information of the query node, this paperproposed one algorithm named Pseudo Anonymous Request Algorithm. In this algorithm, the querynode asks neighbor nodes to act as a query node to send anonymous requests. After cloaking thereal request on the pseudo requests, the query node would not be identified easily. Anotheralgorithm named Local Anonymous Chain Update Algorithm proposed in this paper describes theprocedure of maintaining and modifying the anonymous chain list cached on the nodes. Thisalgorithm updates and maintains local chain list according to node movement patterns and states. Itreduces the network communication flow and saves the energy consumption. In the meantime it canhelp mobile users to avoid been tracking by the attacker. After simulation of the first algorithm, theresults show that the new algorithm can achieve high level location privacy. The simulation result ofthe second algorithm shows that it can alleviate the pressure of the network communication andsave network bandwidth.
Keywords/Search Tags:P2P, K-anonymity, Location Privacy, Pesudo Anonymity, Cloaking Chain
PDF Full Text Request
Related items