An identity-based personal location system with protected privacy in IOT

The internet of things (IOT) has the same security requirements as traditional network, but according to the characteristics of its own, the internet of things also has some specific security features. Among these features, the flexibility of the network requires nodes to apply corresponding measures when scene changes. For example, in emergency situations (e.g. an accident occurs, and a doctor is needed), the location of the user is available, while under normal circumstances, the user's location information is confidential. This paper is in the background of the above scene to present an identity based system for personal location in emergency situations. The proposed system consists of registration subsystem, user authentication subsystem, policy subsystem and client subsystem. The system confirms the identity of the user through the user authentication subsystem and gets the level of the emergency through the policy subsystem. Then it can make sure that user's location information can be accessed only by some authorized user, and only when necessary. The proposed system strengthens the protection of the user's privacy while providing the location of the user, and prevents the disclosure of the users' information.

[1]  Amardeo Sarma,et al.  Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..

[2]  J. Buitelaar,et al.  Future of Identity in the Information Society (FIDIS) , 2008 .

[3]  F. Nazarpour A new method for cell ID assignment for Distance based location management in cellular communication systems , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[4]  Dongho Won,et al.  An RFID System Based MCLT System with Improved Privacy , 2006, EUC Workshops.

[5]  F.H.P. Fitzek,et al.  Localization Information Retrieval Exploiting Cooperation Among Mobile Devices , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[6]  Marc-Michael Bergfeld,et al.  Infrastructure for Trusted Content , 2013 .

[7]  Rui L. Aguiar,et al.  Virtual Identity Framework for Telecom Infrastructures , 2008, Wirel. Pers. Commun..

[8]  Umut Orguner,et al.  Tracking in WiMAX Networks Using Cell-IDs , 2009, 2009 IEEE Mobile WiMAX Symposium.

[9]  Xiaolang Yan,et al.  Wireless sensor networks for logistics and retail , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).