A quantum-inspired hybrid intelligent position monitoring system in wireless networks

Position monitoring systems (PMSs) that offer considerable convenience in our daily lives have been thoroughly studied in the past. A PMS has complete control of the position-related information, and it initiates the problem of a roaming user’s position confidentiality. We study the problem of a mobile object’s position confidentiality in wireless networks. Confidentiality-preserved authentication in position-based roaming services is intended for the provision of legal access to wireless network services. Unfortunately, existing PMSs have practical inadequacies such as position cheating, higher communication cost, fake record generation, and forwarding. We propose a novel quantum-inspired hybrid intelligent PMS in wireless networks with the aim of conserving confidentiality of an individual in real-time position-based services. We devise a quantum-inspired PMS algorithm incorporating fuzzy logic and quantum computational theory to achieve computational intelligence in the problem of a mobile object’s position confidentiality. To the best of our knowledge this is the first work in the PMS literature to integrate the concept of quantum-inspired computation, and hence the proposed PMS algorithm is also the first quantum-inspired hybrid intelligent PMS algorithm for solving the position confidentiality problem with the anonymity concept. The simulation results and case studies prove that the proposed quantum-inspired PMS can conserve confidentiality of the roaming user with reduced communication cost.

[1]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.

[2]  Jong-Hwan Kim,et al.  Genetic quantum algorithm and its application to combinatorial optimization problem , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).

[3]  L. Zadeh A COMPUTATIONAL APPROACH TO FUZZY QUANTIFIERS IN NATURAL LANGUAGES , 1983 .

[4]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[5]  Jianliang Xu,et al.  Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks , 2013, IEEE Pervasive Computing.

[6]  Michael Lindenbaum,et al.  A Generic Grouping Algorithm and Its Quantitative Analysis , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.

[8]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[9]  Tamir Tassa,et al.  Anonymization of Centralized and Distributed Social Networks by Sequential Clustering , 2013, IEEE Transactions on Knowledge and Data Engineering.

[10]  Frederic T. Chong,et al.  A Practical Architecture for Reliable Quantum Computers , 2002, Computer.

[11]  Milena Radenkovic,et al.  Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks , 2014, IEEE Transactions on Vehicular Technology.

[12]  Kyriakos N. Sgarbas,et al.  The Road to Quantum Artificial Intelligence , 2007, ArXiv.

[13]  Arun Kumar Sangaiah,et al.  Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks , 2015 .

[14]  Basel Alomair,et al.  Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[15]  Bor-Sen Chen,et al.  Fuzzy tracking control design for nonlinear dynamic systems via T-S fuzzy model , 2001, IEEE Trans. Fuzzy Syst..

[16]  Dong Hoon Lee,et al.  Efficient Privacy-Preserving Authentication in Wireless Mobile Networks , 2014, IEEE Transactions on Mobile Computing.

[17]  Zvi Drezner,et al.  Facility location - applications and theory , 2001 .

[18]  Jelena V. Misic,et al.  Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[19]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[20]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[21]  Xiaohui Liang,et al.  CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service , 2014, IEEE Internet of Things Journal.

[22]  Sushil Jajodia,et al.  Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.