MixDrones: A Mix Zones-based Location Privacy Protection Mechanism for the Internet of Drones

2021 ◽  
Author(s):  
Alisson R. Svaigen ◽  
Azzedine Boukerche ◽  
Linnyer B. Ruiz ◽  
Antonio A. F. Loureiro
2015 ◽  
Vol 713-715 ◽  
pp. 2462-2466
Author(s):  
Xiu Rong Li ◽  
Shuang Zheng ◽  
Ya Li Liu

In this paper, we describe some privacy threats in the Internet of Things and some research works on privacy protection. We present a new scheme base on cryptosystem to protect privacy in the Internet of Things. The scheme includes location privacy protection, data privacy homomorphism mechanism and information hiding technology, and secure multi-party computation on data privacy.


Author(s):  
Yeongsub Cho ◽  
Sangrae Cho ◽  
Daeseon Choi ◽  
Seunghun Jin ◽  
Kyoil Chung ◽  
...  

Author(s):  
Meiyu Pang ◽  
Li Wang ◽  
Ningsheng Fang

Abstract This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi area multi-user multi MEC server system is designed, in which a MEC server is deployed in each area, and multiple vehicle user equipment in an area can offload computing tasks to MEC servers in different areas by a wireless channel. Then, considering the mobility of users in Internet of vehicles, a vehicle distance prediction based on Kalman filter is proposed to improve the accuracy of vehicle-to-vehicle distance. However, when the vehicle performs the task, it needs to submit the real location, which causes the problem of the location privacy disclosure of vehicle users. Finally, the total cost of communication delay, location privacy of vehicles and energy consumption of all users is formulated as the optimization goal, which take into account the system state, action strategy, reward and punishment function and other factors. Moreover, Double DQN algorithm is used to solve the optimal scheduling strategy for minimizing the total consumption cost of system. Simulation results show that proposed algorithm has the highest computing task completion rate and converges to about 80% after 8000 iterations, and its performance is more ideal compared with other algorithms in terms of system energy cost and task completion rate, which demonstrates the effectiveness of our proposed scheduling strategy.


Sign in / Sign up

Export Citation Format

Share Document