• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo. A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453
Citation: Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo. A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453

A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks

Funds: This work was supported by the National Natural Science Foundation of China (61802302) and the Natural Science Basic Research Program of Shaanxi (2019JM-442).
More Information
  • Published Date: September 30, 2020
  • The influx of massive IoT devices can aggravate the shortage of spectrum resources, while the contradiction that a large number of licensed spectrum resources are underused. The key to resolve this issue is to adopt spectrum sharing. However, some licensed users (LUs) are reluctant to share their idle spectrum due to selfishness and concerning about location privacy leakage, which will seriously restrict the effective implementation of spectrum sharing in IoT Networks. In view of this, a Casper model (GB-Casper) for coding optimization is designed by combining the Geohash encoding prefix and binary encoding suffix with k anonymous region location encoding method. This model employs the minimum area of anonymous region (A\-\{min\}) required by LUs to control the length of Geohash code, and utilizes the binary code to divide k anonymous region in a fine-grained way. Through the string comparison operation, it can determine whether the generated k anonymous region contains k-1 users, so as to reduce the binary number of encoding bits to gradually expand the scan region, and thus achieving the k anonymous region satisfying the protection of location privacy to replace the authorized users’ real location. The spectrum contribution degree is introduced, which is quantified into the game model together with the level of location privacy protection to form an incentive scheme for IoT spectrum sharing against location privacy leakage. Simulation results show that the proposed scheme can quickly construct k anonymous region and effectively motivate LUs to actively participate in spectrum sharing while preventing location privacy leakage.
  • Related Articles

    [1]Zhong Lujie, Wang Mu. Blockchain-Enpowered Cooperative Resource Allocation Scheme for Computing First Network[J]. Journal of Computer Research and Development, 2023, 60(4): 750-762. DOI: 10.7544/issn1000-1239.202330002
    [2]Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan. Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
    [3]Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    [4]He Yunhua, Li Mengru, Li Hong, Sun Limin, Xiao Ke, Yang Chao. A Blockchain Based Incentive Mechanism for Crowdsensing Applications[J]. Journal of Computer Research and Development, 2019, 56(3): 544-554. DOI: 10.7544/issn1000-1239.2019.20170670
    [5]Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li. Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080
    [6]Zhang Xiaoyu, Shang Tao, Liu Jianwei. Detect-Defray Mechanism Based Motivation Scheme for Selfish Nodes of Network Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2620-2627. DOI: 10.7544/issn1000-1239.2017.20160777
    [7]Jiang Qingfeng, Men Chaoguang, Li Xiang, He Zhongzheng. A Virtual Currency-Based Incentive-Aware Low Delay Routing for DTNs[J]. Journal of Computer Research and Development, 2015, 52(12): 2707-2724. DOI: 10.7544/issn1000-1239.2015.20140566
    [8]Wu Yue, Li Jianhua, Lin Chuang. Survey of Security and Trust in Opportunistic Networks[J]. Journal of Computer Research and Development, 2013, 50(2): 278-290.
    [9]Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406.
    [10]Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.
  • Cited by

    Periodical cited type(18)

    1. 李红艳,徐寅森,张子栋. 蜂窝移动网络大数据聚类异常挖掘方法仿真. 计算机仿真. 2024(02): 406-409+414 .
    2. 程一帆,刘擎宇,梁泽宇,于昇. 严格可证明安全的两方协同SM2签名协议. 电子学报. 2024(02): 540-549 .
    3. 彭金辉,张志鸿. 面向软件的随机数发生器设计和实现. 计算机工程与设计. 2024(04): 1004-1010 .
    4. 涂彬彬,陈宇. 支持批量证明的SM2适配器签名及其分布式扩展. 软件学报. 2024(05): 2566-2582 .
    5. 荆继武,张世聪,王平建. 门限密码技术及其标准化进展. 密码学报(中英文). 2024(01): 227-254 .
    6. 高文娟. 移动电子签名认证服务在医院信息化的应用. 电脑知识与技术. 2024(21): 83-85 .
    7. 韩庆迪,陆思奇. 基于SOTP加密保护签名私钥的SM2签名方案. 密码学报(中英文). 2024(05): 991-1002 .
    8. 包子健,何德彪,彭聪,罗敏,黄欣沂. 基于SM2数字签名算法的可否认环签名. 密码学报. 2023(02): 264-275 .
    9. 文嘉明,王后珍,刘金会,张焕国. Aitps:基于非对称模格问题的两方协同签名方案. 计算机研究与发展. 2023(09): 2137-2151 . 本站查看
    10. 蔡昭炜,刘从军,刘超. 基于SM2的不动产柜面无纸化签署系统设计与实现. 智能计算机与应用. 2023(09): 122-128 .
    11. 黎洪亮,金华标,庞启君,赵钊. 内嵌SM2算法的内河船机排放数据加密通信装置设计. 农业装备与车辆工程. 2023(10): 28-31+37 .
    12. 彭金辉,雷宗华,张志鸿. ECDSA协同签名方案设计与实现. 信息安全研究. 2023(11): 1120-1130 .
    13. 徐子钧,刘建伟,李耕. 面向5G mMTC的网络切片安全研究. 网络与信息安全学报. 2022(01): 95-105 .
    14. 苏簪铀,马振华,王志洋. 基于协同签名的电网移动GIS签名系统的设计与实现. 农村电气化. 2022(04): 50-53 .
    15. 赵秀凤,付雨. Aigis-sig方案的门限数字签名协议研究. 密码学报. 2022(05): 872-882 .
    16. 白雪,秦宝东,郭瑞,郑东. 基于SM2的两方协作盲签名协议. 网络与信息安全学报. 2022(06): 39-51 .
    17. 杨伊,何德彪,文义红,罗敏. 密钥管理服务系统下的多方协同SM4加/解密方案. 信息网络安全. 2021(08): 17-25 .
    18. 彭聪,罗敏,何德彪,黄欣沂. 基于SM2数字签名算法的适配器签名方案. 计算机研究与发展. 2021(10): 2278-2286 . 本站查看

    Other cited types(7)

Catalog

    Article views (753) PDF downloads (213) Cited by(25)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return