Cargando…
Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantl...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10052172/ https://www.ncbi.nlm.nih.gov/pubmed/36991852 http://dx.doi.org/10.3390/s23063142 |
_version_ | 1785015096671469568 |
---|---|
author | Alkanjr, Basmh Mahgoub, Imad |
author_facet | Alkanjr, Basmh Mahgoub, Imad |
author_sort | Alkanjr, Basmh |
collection | PubMed |
description | The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantly from regular IoT networks. In war scenarios, real-time location information gathering is critical for combat effectiveness and is dependent on network connectivity and information sharing in the presence of an enemy. To maintain connectivity and guarantee the safety of soldiers/equipment, location information must be exchanged. The location, identification, and trajectory of soldiers/devices are all contained in these messages. A malicious attacker may utilize this information to build a complete trajectory of a target node and track it. This paper proposes a location privacy-preserving scheme in IoBT networks using deception-based techniques. Dummy identifier (DID), sensitive areas location privacy enhancement, and silence period concepts are used to minimize the attacker’s ability to track a target node. In addition, to consider the security of the location information, another security layer is proposed, which generates a pseudonym location for the source node to use instead of its real location when sending messages in the network. We develop a Matlab simulation to evaluate our scheme in terms of average anonymity and probability of linkability of the source node. The results show that the proposed method improves the anonymity of the source node. It reduces the attacker’s ability to link the old DID of the source node with its new DID. Finally, the results show further privacy enhancement by applying the sensitive area concept, which is important for IoBT networks. |
format | Online Article Text |
id | pubmed-10052172 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100521722023-03-30 Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques Alkanjr, Basmh Mahgoub, Imad Sensors (Basel) Article The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantly from regular IoT networks. In war scenarios, real-time location information gathering is critical for combat effectiveness and is dependent on network connectivity and information sharing in the presence of an enemy. To maintain connectivity and guarantee the safety of soldiers/equipment, location information must be exchanged. The location, identification, and trajectory of soldiers/devices are all contained in these messages. A malicious attacker may utilize this information to build a complete trajectory of a target node and track it. This paper proposes a location privacy-preserving scheme in IoBT networks using deception-based techniques. Dummy identifier (DID), sensitive areas location privacy enhancement, and silence period concepts are used to minimize the attacker’s ability to track a target node. In addition, to consider the security of the location information, another security layer is proposed, which generates a pseudonym location for the source node to use instead of its real location when sending messages in the network. We develop a Matlab simulation to evaluate our scheme in terms of average anonymity and probability of linkability of the source node. The results show that the proposed method improves the anonymity of the source node. It reduces the attacker’s ability to link the old DID of the source node with its new DID. Finally, the results show further privacy enhancement by applying the sensitive area concept, which is important for IoBT networks. MDPI 2023-03-15 /pmc/articles/PMC10052172/ /pubmed/36991852 http://dx.doi.org/10.3390/s23063142 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Alkanjr, Basmh Mahgoub, Imad Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title | Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title_full | Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title_fullStr | Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title_full_unstemmed | Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title_short | Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques |
title_sort | location privacy-preserving scheme in iobt networks using deception-based techniques |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10052172/ https://www.ncbi.nlm.nih.gov/pubmed/36991852 http://dx.doi.org/10.3390/s23063142 |
work_keys_str_mv | AT alkanjrbasmh locationprivacypreservingschemeiniobtnetworksusingdeceptionbasedtechniques AT mahgoubimad locationprivacypreservingschemeiniobtnetworksusingdeceptionbasedtechniques |