通信学报 ›› 2023, Vol. 44 ›› Issue (9): 188-204.doi: 10.11959/j.issn.1000-436x.2023162
• 综述 • 上一篇
王志恒, 徐彦彦
修回日期:
2023-08-21
出版日期:
2023-09-01
发布日期:
2023-09-01
作者简介:
王志恒(1996- ),男,河南汝州人,武汉大学博士生,主要研究方向为安全定位技术、云计算安全等基金资助:
Zhiheng WANG, Yanyan XU
Revised:
2023-08-21
Online:
2023-09-01
Published:
2023-09-01
Supported by:
摘要:
智能手机的室内定位服务通常由第三方定位服务商提供,其独有的隐私泄露风险已成为制约其发展的主要因素,如何保护定位过程中用户和数据的隐私成为一个亟待解决的重要问题。对近年来室内定位隐私保护的研究进展进行综述。介绍了常用的室内定位技术,讨论了室内定位系统的不同实现架构及其威胁模型、隐私保护需求,总结了应用于室内定位隐私保护的安全技术,分类介绍了针对不同架构的室内定位隐私保护方案,全面比较和分析了不同方案的性能及其优缺点,总结并展望了未来的研究方向。
中图分类号:
王志恒, 徐彦彦. 室内定位隐私保护综述[J]. 通信学报, 2023, 44(9): 188-204.
Zhiheng WANG, Yanyan XU. Survey on privacy protection indoor positioning[J]. Journal on Communications, 2023, 44(9): 188-204.
表1
基于集中式架构的隐私保护方案"
安全技术 | 文献 | 方案分类 | 隐私算法 | 隐私保护度 | 计算/通信开销 | 定位精度 | |||
测量信息 | 数据库信息 | 定位结果 | 总体Level | ||||||
文献[ | Elgamal | 受加密保护 | 无加密且易受分析攻击 | 在用户端获得 | Level-Ⅰ | 高,但是网格划分可以降低开销 | 网格划分方式降低定位精度 | ||
文献[ | Paillier | 受加密保护 | 无加密且易受分析攻击 | 在用户端获得 | Level-Ⅰ | 高 | AP mask会降低定位精度 | ||
基于同态 | 文献[ | 同态加密 | Paillier | 受加密保护 | 无加密 | 在用户端获得,但会向服务器泄露区域信息 | Level-Ⅰ | 高 | 不影响精度 |
加密和安全多 | 文献[ | Paillier | 受加密保护 | 无加密保护 | 在用户端获得 | Level-Ⅱ | 高 | 不影响精度 | |
方计算的方案 | 文献[ | Paillier | 受加密保护 | 模型无加密保护 | 密文结果 | Level-Ⅱ | 中 | 不影响精度 | |
文献[ | 安全多方计算 | 以Paillier实现 | 受加密保护 | 受盲化处理 | 密文结果 | Level-Ⅱ | 高 | 不影响精度 | |
文献[ | ABY | 被分割保护 | 被分割保护 | 被分割保护 | Level-Ⅲ | 高 | 受量化位数影响 | ||
文献[ | 混合方案 | Paillier和ABY | 受加密保护 | 无加密,但抵抗数据分析 | 在用户端获得 | Level-Ⅱ | 高 | 不影响精度 | |
文献[ | 众包建库 | 拉普拉斯机制 | 秘密共享和差分隐私保护 | — | 秘密共享和差分隐私噪声保护 | Level-Ⅱ | 高 | 降低数据库的准确性和定位精度 | |
基于差分隐私的方案 | 文献[ | 模型训练 | 拉普拉斯机制 | 差分隐私噪声 | — | 差分隐私训练模型保护 | Level-Ⅱ | 低 | 降低在模型精度和定位精度 |
文献[ | 定位过程 | 拉普拉斯机制和指数机制 | AP模糊化 | 基于DP聚类和扰动保护 | 用户端获得 | Level-Ⅱ | 低 | 降低精度 | |
文献[ | 拉普拉斯机制 | 差分隐私噪声保护 | 无保护 | 匿名保护 | Level-Ⅱ | 低 | 降低精度 | ||
文献[ | 假名技术,身份替换 | 对称加密和匿名保护 | 无保护 | Hilbert变换,加密和匿名 | Level-Ⅱ | 中 | 不影响精度 | ||
文献[ | 有匿名器 | 假名技术,身份删除 | 匿名保护 | 无保护 | 匿名保护 | Level-Ⅰ | 低 | 不影响精度 | |
基于k匿名的方案 | 文献[ | 随机化技术,哑元信息生成 | 匿名保护 | 无保护 | 匿名保护 | Level-Ⅱ | 取决于匿名度 | 不影响精度 | |
文献[ | 无匿名器 | 随机化技术,哑元信息生成 | 匿名保护 | 无保护 | 匿名保护 | Level-Ⅱ | 取决于匿名度 | 不影响精度 | |
文献[ | 随机化技术 | 受布隆过滤器保护 | 泄露部分数据库 | 匿名保护 | Level-Ⅰ | 中 | 不影响精度 |
表3
云环境下隐私保护定位方案的安全技术和性能评价指标"
文献 | 安全技术 | 定位算法 | 隐私保护度 | 计算/通信开销 | 定位精度 | |||
测量信息 | 数据库信息 | 定位结果 | 总体 | |||||
文献[ | 同态加密 | 无线信号交会 | 加密保护 | 加密保护 | 加密保护 | Level-Ⅲ | 高 | 不影响精度 |
文献[ | 随机矩阵拼接和乘法 | 无线信号交会 | 受随机矩阵隐藏保护 | 受随机矩阵隐藏保护 | 受随机矩阵隐藏保护 | Level-Ⅲ | 低 | 不影响精度 |
文献[ | 内积函数加密 | 无线信号交会 | 加密保护 | 加密保护 | k匿名保护 | Level-Ⅲ | 取决于k值 | 不影响精度 |
文献[ | 安全多方计算 | 数据库匹配定位 | 数据分割保护 | 数据分割保护 | 数据分割保护 | Level-Ⅲ | 高 | 受方案中量化位数影响 |
文献[ | 软件防护扩展 | 无线信号交会 | 远程证明机制保护 | 物理隔离 | 远程证明机制保护 | Level-Ⅲ | 低 | 不影响精度 |
表4
各种安全技术的常用场景、隐私保护度、计算/通信开销和定位精度"
安全技术 | 常用场景 | 隐私保护度 | 计算/通信开销 | 定位精度 |
同态加密和安全多方计算 | 集中式定位架构 | 高,但通常不保护数据库信息 | 高,随数据库线性增长 | 不影响定位精度 |
差分隐私 | 集中式定位架构 | 可量化的隐私保护强度 | 低 | 显著降低定位精度 |
k匿名 | 集中式定位架构 | 取决于匿名度和匿名机制 | 中,取决于匿名度 | 不影响定位精度 |
信息隐藏 | 分布式定位架构 | 低,无法抵抗共谋攻击 | 低 | 不影响定位精度 |
零知识证明、安全路由等 | 协作式定位架构 | 高,保护参与用户的匿名性 | 高 | 不影响定位精度 |
内积函数加密、矩阵乘法加密、物理隔离等 | 云定位架构 | 高,同时包含测量信息、数据库信息和定位结果 | 中 | 不影响定位精度 |
[76] | CASANOVA-MARQUéS R , PASCACIO P , HAJNY J ,et al. Anonymous attribute-based credentials in collaborative indoor positioning systems[C]// Proceedings of the 18th International Conference on Security and Cryptography. Piscataway:IEEE Press, 2021: 791-797. |
[77] | CASANOVA-MARQUéS R , TORRES-SOSPEDRA J , HAJNY J ,et al. Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs[J]. Internet of Things, 2023,22:100801. |
[78] | SADHU V , ZONOUZ S , SRITAPAN V ,et al. CollabLoc:privacy-preserving multi-modal collaborative mobile phone localization[J]. IEEE Transactions on Mobile Computing, 2021,20(1): 104-116. |
[79] | DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[C]// Proceedings of the 13th USENIX Security Symposium. Berkeley:USENIX Association, 2004: 1-17. |
[80] | ZAFARI F , GKELIAS A , LEUNG K K . A survey of indoor localization systems and technologies[J]. IEEE Communications Surveys &Tutorials, 2019,21(3): 2568-2599. |
[81] | OBEIDAT H , SHUAIEB W , OBEIDAT O ,et al. A review of indoor localization techniques and wireless technologies[J]. Wireless Personal Communications, 2021,119(1): 289-327. |
[82] | CHEN R , CHEN L . Indoor positioning with smartphones:the state-ofthe-art and the challenges[J]. Acta Geodaetica et Cartographica Sinica, 2017,46(10): 1316-1326. |
[83] | 施闯, 章红平, 辜声峰 ,等. 云定位技术及云定位服务平台[J]. 武汉大学学报(信息科学版), 2015,40(8): 995-999. |
SHI C , ZHANG H P , GU S F ,et al. Technology of cloud positioning and its platform for positioning service[J]. Geomatics and Information Science of Wuhan University, 2015,40(8): 995-999. | |
[84] | 张传明, 杨玲玲, 刘敏 ,等. 面向海量智能终端的云定位系统设计与实现[J]. 武汉大学学报(信息科学版), 2021,46(12): 1872-1880. |
ZHANG C M , YANG L L , LIU M ,et al. Design and implementation of cloud positioning system for massive intelligent terminals[J]. Geomatics and Information Science of Wuhan University, 2021,46(12): 1872-1880. | |
[1] | WEI G , CONGYI H , WANYANG X ,et al. Research progress and prospect of indoor navigation and positioning technology[J]. Journal of Navigation and Positioning, 2019,7(1): 10-17. |
[2] | DAYU Y A N , WEI S , XUDAN W ,et al. Review of development status of indoor location technology in China[J]. Journal of Navigation and Positioning, 2019,7(4): 5-12. |
[3] | WANG Z , XU Y , YAN Y ,et al. Privacy-preserving indoor localization based on inner product encryption in a cloud environment[J]. Knowledge-Based Systems, 2022,239:108005. |
[4] | 刘公绪, 史凌峰 . 室内导航与定位技术发展综述[J]. 导航定位学报, 2018,6(2): 7-14. |
LIU G X , SHI L F . An overview about development of indoor navigation and positioning technology[J]. Journal of Navigation and Positioning, 2018,6(2): 7-14. | |
[5] | GILLETTE M D , SILVERMAN H F . A linear closed-form algorithm for source localization from time-differences of arrival[J]. IEEE Signal Processing Letters, 2008,15: 1-4. |
[6] | BAHL P , PADMANABHAN V N . RADAR:an in-building RF-based user location and tracking system[C]// Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway:IEEE Press, 2002: 775-784. |
[7] | YOUSSEF M , AGRAWALA A . The Horus WLAN location determination system[C]// Proceedings of the 3rd International Conference on Mobile Systems,Applications,and Services. New York:ACM Press, 2005: 205-218. |
[8] | LI H , SUN L M , ZHU H J ,et al. Achieving privacy preservation in Wi-Fi fingerprint-based localization[C]// Proceedings of 2014 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 2337-2345. |
[9] | SHI X F , WU J F . To hide private position information in localization using time difference of arrival[J]. IEEE Transactions on Signal Processing, 2018,66(18): 4946-4956. |
[10] | SHU T , CHEN Y Y , YANG J ,et al. Multi-lateral privacy-preserving localization in pervasive environments[C]// Proceedings of 2014 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 2319-2327. |
[11] | PASCACIO P , CASTELEYN S , TORRES-SOSPEDRA J , ,et al. Collaborative indoor positioning systems:a systematic review[J]. Sensors, 2021,21(3): 1002. |
[12] | YANG Z , J?RVINEN K . Modeling privacy in Wi-Fi fingerprinting indoor localization[C]// Proceedings of International Conference on Provable Security. Piscataway:IEEE Press, 2018: 329-346. |
[13] | ZHANG G L , ZHANG A Q , ZHAO P ,et al. Lightweight privacy-preserving scheme in Wi-Fi fingerprint-based indoor localization[J]. IEEE Systems Journal, 2020,14(3): 4638-4647. |
[14] | RIVEST R L , DERTOUZOS M L , ADLEMAN L . On data banks and privacy homomorphisms[J]. Foundations of secure computation, 1978,25: 222-233. |
[15] | ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472. |
[16] | PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[C]// Advances in Cryptology-EUROCRYPT ’99. Berlin:Springer, 2007: 223-238. |
[17] | GENTRY C . Fully homomorphic encryption using ideal lattices[C]// Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 169-178. |
[18] | MICROSOFT. Microsoft SEAL (release 4.1)[R]. 2023. |
[19] | YAO A C . Protocols for secure computations[C]// Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2008: 160-164. |
[20] | GOLDREICH O , MICALI S , WIGDERSON A . How to play any mental game,or a completeness theorem for protocols with honest majority[C]// Providing Sound Foundations for Cryptography:On the Work of Shafi Goldwasser and Silvio Micali. New York:ACM Press, 2019: 307-328. |
[21] | GOLDWASSER S . Multi party computations:past and present[C]// Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing. New York:ACM Press, 1997: 1-6. |
[22] | KOLESNIKOV V , SCHNEIDER T . Improved garbled circuit:free XOR gates and applications[C]// International Colloquium on Automata,Languages,and Programming. Berlin:Springer, 2008: 486-498. |
[23] | FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems[C]// Lecture Notes in Computer Science. Berlin:Springer, 1987: 186-194. |
[24] | RABIN M O . How to exchange secrets with oblivious transfer[R]. 1981. |
[25] | EVEN S , GOLDREICH O , LEMPEL A . A randomized protocol for signing contracts[J]. Communications of the ACM, 1985,28(6): 637-647. |
[26] | NAOR M , PINKAS B . Efficient oblivious transfer protocols[C]// Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms. New York:ACM Press, 2001: 448-457. |
[27] | AIELLO B , ISHAI Y , REINGOLD O . Priced oblivious transfer:how to sell digital goods[C]// Advances in Cryptology-EUROCRYPT 2001. Berlin:Springer, 2001: 119-135. |
[28] | ISHAI Y , KILIAN J , NISSIM K ,et al. Extending oblivious transfers efficiently[C]// Advances in Cryptology-CRYPTO 2003. Berlin:Springer, 2003: 145-161. |
[29] | LINDELL A Y . Efficient fully-simulatable oblivious transfer[C]// Topics in Cryptology-CT-RSA 2008. Berlin:Springer, 2008: 52-70. |
[30] | DEMMLER D , SCHNEIDER T , ZOHNER M . ABY - a framework for efficient mixed-protocol secure two-party computation[C]// Proceedings of 2015 Network and Distributed System Security Symposium. Reston:Internet Society, 2015: 8-11. |
[31] | HUANG Y , EVANS D , KATZ J ,et al. Faster secure two-party computation using garbled circuits[C]// USENIX Security Symposium. Berkeley:USENIX Association, 2011:35. |
[32] | LIU C , WANG X S , NAYAK K ,et al. ObliVM:a programming framework for secure computation[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 359-376. |
[33] | MOOD B , GUPTA D , CARTER H ,et al. Frigate:a validated,extensible,and efficient compiler and interpreter for secure computation[C]// Proceedings of 2016 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2016: 112-127. |
[34] | J?RVINEN K , LEPP?KOSKI H , LOHAN E S ,et al. PILOT:practical privacy-preserving indoor localization using outsourcing[C]// Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2019: 448-463. |
[35] | DWORK C . Automata,languages and programming[M]. Berlin: Springer, 2006. |
[36] | DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2013,9(3/4): 211-407. |
[37] | BHASKAR R , BHOWMICK A , GOYAL V ,et al. Noiseless database privacy[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2011: 215-232. |
[38] | DWORK C . Differential privacy:a survey of results[C]// International Conference on Theory and Applications of Models of Computation. Berlin:Springer, 2008: 1-19. |
[39] | DWORK C , LEI J . Differential privacy and robust statistics[C]// Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 371-380. |
[40] | DWORK C , NAOR M , REINGOLD O ,et al. On the complexity of differentially private data release:efficient algorithms and hardness results[C]// Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 381-390. |
[41] | SCHAUER L , DORFMEISTER F , WIRTH F . Analyzing passive Wi-Fi fingerprinting for privacy-preserving indoor-positioning[C]// Proceedings of 2016 International Conference on Localization and GNSS (ICL-GNSS). Piscataway:IEEE Press, 2016: 1-6. |
[42] | 张钊, 华景煜 . 基于指纹识别的室内定位中的隐私保护[J]. 南京信息工程大学学报(自然科学版), 2017,9(5): 551-559. |
ZHANG Z , HUA J Y . Privacy-preserving in fingerprinting-based indoor localization[J]. Journal of Nanjing University of Information Science & Technology (Natural Science Edition), 2017,9(5): 551-559. | |
[43] | ESHUN S N , PALMIERI P . A privacy-preserving protocol for indoor Wi-Fi localization[C]// Proceedings of the 16th ACM International Conference on Computing Frontiers. New York:ACM Press, 2019: 380-385. |
[44] | YANG Z , J?RVINEN K . The death and rebirth of privacy-preserving Wi-Fi fingerprint localization with paillier encryption[C]// Proceedings of 2018 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2018: 1223-1231. |
[45] | ZHANG T , CHOW S S M , ZHOU Z ,et al. Privacy-preserving Wi-Fi fingerprinting indoor localization[C]// International Workshop on Security. Cham:Springer, 2016: 215-233. |
[46] | NIEMINEN R , J?RVINEN K . Practical privacy-preserving indoor localization based on secure two-party computation[J]. IEEE Transactions on Mobile Computing, 2021,20(9): 2877-2890. |
[47] | SUN M X , DONG X J , WU F ,et al. An efficient privacy-preserving fingerprint-based localization scheme employing oblivious transfer[C]// International Conference on Mobile Ad-Hoc and Sensor Networks. Singapore:Springer, 2018: 110-132. |
[48] | ZIEGELDORF J H , VIOL N , HENZE M ,et al. POSTER:privacy-preserving indoor localization[J]. arXiv Preprint,arXiv:1410.3270, 2014. |
[49] | VIOL N , BITSCH L J á , WIRTZ H ,et al. Hidden Markov model-based 3D path-matching using raytracing-generated Wi-Fi models[C]// Proceedings of 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN). Piscataway:IEEE Press, 2013: 1-10. |
[50] | HU Z H , LI Y Z , JIANG G S ,et al. PriHorus:privacy-preserving RSS-based indoor positioning[C]// Proceedings of 2022 IEEE International Conference on Communications. Piscataway:IEEE Press, 2022: 5627-5632. |
[51] | BEETS C V D , NIEMINEN R , SCHNEIDER T . FAPRIL:towards faster privacy-preserving fingerprint-based localization[C]// Proceedings of the 19th International Conference on Security and Cryptography. Piscataway:IEEE Press, 2022: 1-10. |
[52] | LI S J , LI H , SUN L M . Privacy-preserving crowd sourced site survey in Wi-Fi fingerprint-based localization[J]. EURASIP Journal on Wireless Communications and Networking, 2016(1): 1-9. |
[53] | ZHANG X J , HE F C , CHEN Q ,et al. A differentially private indoor localization scheme with fusion of Wi-Fi and bluetooth fingerprints in edge computing[J]. Neural Computing and Applications, 2022,34(6): 4111-4132. |
[54] | ZHU Y J , WANG Y , LIU Q Y ,et al. Wi-Fi fingerprint releasing for indoor localization based on differential privacy[C]// Proceedings of 2017 IEEE 28th Annual International Symposium on Personal,Indoor,and Mobile Radio Communications (PIMRC). Piscataway:IEEE Press, 2018: 1-6. |
[55] | ZHANG X J , CHEN Q , PENG X H ,et al. Differential privacy-based indoor localization privacy protection in edge computing[C]// Proceedings of 2019 IEEE SmartWorld,Ubiquitous Intelligence & Computing,Advanced & Trusted Computing,Scalable Computing &Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Piscataway:IEEE Press, 2020: 491-496. |
[56] | WANG Y F , HUANG M J , JIN Q ,et al. DP3:a differential privacy-based privacy-preserving indoor localization mechanism[J]. IEEE Communications Letters, 2018,22(12): 2547-2550. |
[57] | ZHAO P , JIANG H B , LUI J C S ,et al. P3-LOC:a privacy-preserving paradigm-driven framework for indoor localization[J]. IEEE/ACM Transactions on Networking, 2018,26(6): 2856-2869. |
[58] | ALIKHANI N , MOGHTADAIEE V , SAZDAR A M ,et al. A privacy preserving method for crowdsourcing in indoor fingerprinting localization[C]// Proceedings of 2018 8th International Conference on Computer and Knowledge Engineering (ICCKE). Piscataway:IEEE Press, 2018: 58-62. |
[59] | SAZDAR A M , ALIKHANI N , GHORASHI S A ,et al. Privacy preserving in indoor fingerprint localization and radio map expansion[J]. Peer-to-Peer Networking and Applications, 2021,14(1): 121-134. |
[60] | 王宇航, 张宏莉, 余翔湛 . KAP:一种面向定位服务的位置隐私保护方法[J]. 通信学报, 2014,35(11): 182-190. |
WANG Y H , ZHANG H L , YU X Z . KAP:location privacy-preserving approach in location services[J]. Journal on Communications, 2014,35(11): 182-190. | |
[61] | HOU M , ZHANG H L , WANG Y H . OFC:an approach for protecting location privacy from location provider in location-based services[C]// Proceedings of 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Piscataway:IEEE Press, 2018: 917-922. |
[62] | 金军 . 基于Wi-Fi指纹室内定位隐私保护研究[D]. 武汉:华中科技大学, 2017. |
JIN J . Research on privacy protection of indoor location based on Wi-Fi fingerprint[D]. Wuhan:Huazhong University of Science and Technology, 2017. | |
[63] | LI H , HE Y H , CHENG X Z ,et al. A lightweight location privacy-preserving scheme for Wi-Fi fingerprint-based localization[C]// Proceedings of 2016 International Conference on Identification,Information and Knowledge in the Internet of Things (IIKI). Piscataway:IEEE Press, 2018: 525-529. |
[64] | ZHAO P , LIU W W , ZHANG G L ,et al. Preserving privacy in Wi-Fi localization with plausible dummy locations[J]. IEEE Transactions on Vehicular Technology, 2020,69(10): 11909-11925. |
[65] | KONSTANTINIDIS A , CHATZIMILIOUDIS G , ZEINALIPOURYAZTI D ,et al. Privacy-preserving indoor localization on smartphones[J]. IEEE Transactions on Knowledge and Data Engineering, 2015,27(11): 3042-3055. |
[66] | WANG G H , HE J P , SHI X F ,et al. Analyzing and evaluating efficient privacy-preserving localization for pervasive computing[J]. IEEE Internet of Things Journal, 2018,5(4): 2993-3007. |
[67] | ZHAO H Y , YAN J , LUO X Y ,et al. Privacy preserving solution for the asynchronous localization of underwater sensor networks[J]. IEEE/CAA Journal of Automatica Sinica, 2020,7(6): 1511-1527. |
[68] | SHI X F , TONG F , ZHANG W A ,et al. Resilient privacy-preserving distributed localization against dishonest nodes in Internet of things[J]. IEEE Internet of Things Journal, 2020,7(9): 9214-9223. |
[69] | KHAN U A , KAR S , MOURA J M F . Distributed sensor localization in random environments using minimal number of anchor nodes[J]. IEEE Transactions on Signal Processing, 2009,57(5): 2000-2016. |
[70] | LI Y J , WANG G H , ZUO F . Efficient privacy preserving single anchor localization using noise-adding mechanism for Internet of things[C]// International Conference on Web Information Systems and Applications. Cham:Springer, 2021: 261-273. |
[71] | WANG G H , XU Y F , TONG F ,et al. Modeling and analyzing single anchor localization for Internet of things[C]// Proceedings of 2019 IEEE International Conference on Communications (ICC). Piscataway:IEEE Press, 2019: 1-6. |
[72] | ZUO F Y , LI Y J , WANG G H ,et al. Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of things[J]. Future Generation Computer Systems, 2023,148: 524-537. |
[73] | WANG G H , ZHANG X Y , LI Y J . Design and analysis of privacy-preserving localization assisted by reconfigurable intelligent surface for Internet of things[C]// Proceedings of the 2023 11th International Conference on Communications and Broadband Networking. New York:ACM Press, 2023: 1-7. |
[85] | KHANH T T , NGUYEN V , PHAM X Q ,et al. Wi-Fi indoor positioning and navigation:a cloudlet-based cloud computing approach[J]. Human-Centric Computing and Information Sciences, 2020,10(1): 1-26. |
[86] | HAO X U , JINZHONG B E I , DEHAI L I ,et al. Research on design and application of indoor location service cloud platform[J]. Journal of Navigation and Positioning, 2021,9(5): 126-133. |
[87] | 刘霄, 秘金钟, 李得海 ,等. 室内位置云平台关键技术研究[J]. 测绘科学, 2019,44(6): 79-83,144. |
LIU X , BEI J Z , LI D H ,et al. Research on the key technologies of indoor location cloud platform[J]. Science of Surveying and Mapping, 2019,44(6): 79-83,144. | |
[88] | SHOUKRY Y , GATSIS K , ALANWAR A ,et al. Privacy-aware quadratic optimization using partially homomorphic encryption[C]// Proceedings of 2016 IEEE 55th Conference on Decision and Control (CDC). Piscataway:IEEE Press, 2016: 5053-5058. |
[89] | LIU S S , YAN Z . Efficient privacy protection protocols for 5G-enabled positioning in industrial IoT[J]. IEEE Internet of Things Journal, 2022,9(19): 18527-18538. |
[90] | YAN Z , QIAN X R , LIU S S ,et al. Privacy protection in 5G positioning and location-based services based on SGX[J]. ACM Transactions on Sensor Networks, 2022,18(3): 1-19. |
[74] | ALANWAR A , SHOUKRY Y , CHAKRABORTY S ,et al. PrOLoc:resilient localization with private observers using partial homomorphic encryption[C]// Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks. New York:ACM Press, 2017: 41-52. |
[75] | HUSSAIN S U , KOUSHANFAR F . Privacy preserving localization for smart automotive systems[C]// Proceedings of the 53rd Annual Design Automation Conference. New York:ACM Press, 2016: 1-6. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[4] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 陈炜宇, 骆俊杉, 王方刚, 丁海洋, 王世练, 夏国江. 无线隐蔽通信容量限与实现技术综述[J]. 通信学报, 2022, 43(8): 203-218. |
[8] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[9] | 谢良波, 李宇洋, 王勇, 周牧, 聂伟. 基于自适应蝙蝠算法的室内RFID定位算法[J]. 通信学报, 2022, 43(8): 90-99. |
[10] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[11] | 赵增华, 童跃凡, 崔佳洋. 基于域自适应的Wi-Fi指纹设备无关室内定位模型[J]. 通信学报, 2022, 43(4): 143-153. |
[12] | 谢良波, 刘西西, 王勇, 周牧, 田增山. 基于RFID载波相位的室内EKF定位算法[J]. 通信学报, 2022, 43(3): 124-134. |
[13] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[14] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[15] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|