Privacy preserved wireless sensor location protocols based on mobile edge computing

Abstract The emergence of all kinds of Internet of Things applications have brought great convenience to the people’s life, while wireless sensor location is one of the most important basements for them. Security and privacy issues should always the top priority of a system, however, the privacy protection of wireless sensor location is particularly difficult. In this paper, corresponding to the most common location algorithms, trilateration and multilateration, two privacy preserved location protocols are proposed based on Paillier’s homomorphic encryption scheme. The protocols are designed in Mobile-Edge Computing architecture. Different from other schemes who protect location privacy by identity anonymity, the proposed protocols protect the privacy of the real location information. The base stations who are semi-honest and not colluding with each other, send the encrypted distance data to edge server, and edge server computes on ciphertext and products the encrypted location of the sensor. The security of the protocols is based on the semantic security of Paillier encryption. To obtain the sensor’s position in a privacy protect manner, all the extra calculations include one step of encryption for each base station and one step of decryption for sensor, and only two times of message transmission are needed, the proposed protocols are secure and practical.

[1]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[2]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[3]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[4]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[5]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[6]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[7]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[8]  Patrick Traynor,et al.  Secure outsourced garbled circuit evaluation for mobile devices , 2013, J. Comput. Secur..

[9]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[10]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[11]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[12]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[13]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[14]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[16]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[17]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[18]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[20]  Gerhard P. Hancke,et al.  Distance Bounding: A Practical Security Solution for Real-Time Location Systems , 2013, IEEE Transactions on Industrial Informatics.

[21]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[22]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[23]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.