Cargando…

Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques

The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantl...

Descripción completa

Detalles Bibliográficos
Autores principales: Alkanjr, Basmh, Mahgoub, Imad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10052172/
https://www.ncbi.nlm.nih.gov/pubmed/36991852
http://dx.doi.org/10.3390/s23063142
_version_ 1785015096671469568
author Alkanjr, Basmh
Mahgoub, Imad
author_facet Alkanjr, Basmh
Mahgoub, Imad
author_sort Alkanjr, Basmh
collection PubMed
description The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantly from regular IoT networks. In war scenarios, real-time location information gathering is critical for combat effectiveness and is dependent on network connectivity and information sharing in the presence of an enemy. To maintain connectivity and guarantee the safety of soldiers/equipment, location information must be exchanged. The location, identification, and trajectory of soldiers/devices are all contained in these messages. A malicious attacker may utilize this information to build a complete trajectory of a target node and track it. This paper proposes a location privacy-preserving scheme in IoBT networks using deception-based techniques. Dummy identifier (DID), sensitive areas location privacy enhancement, and silence period concepts are used to minimize the attacker’s ability to track a target node. In addition, to consider the security of the location information, another security layer is proposed, which generates a pseudonym location for the source node to use instead of its real location when sending messages in the network. We develop a Matlab simulation to evaluate our scheme in terms of average anonymity and probability of linkability of the source node. The results show that the proposed method improves the anonymity of the source node. It reduces the attacker’s ability to link the old DID of the source node with its new DID. Finally, the results show further privacy enhancement by applying the sensitive area concept, which is important for IoBT networks.
format Online
Article
Text
id pubmed-10052172
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100521722023-03-30 Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques Alkanjr, Basmh Mahgoub, Imad Sensors (Basel) Article The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantly from regular IoT networks. In war scenarios, real-time location information gathering is critical for combat effectiveness and is dependent on network connectivity and information sharing in the presence of an enemy. To maintain connectivity and guarantee the safety of soldiers/equipment, location information must be exchanged. The location, identification, and trajectory of soldiers/devices are all contained in these messages. A malicious attacker may utilize this information to build a complete trajectory of a target node and track it. This paper proposes a location privacy-preserving scheme in IoBT networks using deception-based techniques. Dummy identifier (DID), sensitive areas location privacy enhancement, and silence period concepts are used to minimize the attacker’s ability to track a target node. In addition, to consider the security of the location information, another security layer is proposed, which generates a pseudonym location for the source node to use instead of its real location when sending messages in the network. We develop a Matlab simulation to evaluate our scheme in terms of average anonymity and probability of linkability of the source node. The results show that the proposed method improves the anonymity of the source node. It reduces the attacker’s ability to link the old DID of the source node with its new DID. Finally, the results show further privacy enhancement by applying the sensitive area concept, which is important for IoBT networks. MDPI 2023-03-15 /pmc/articles/PMC10052172/ /pubmed/36991852 http://dx.doi.org/10.3390/s23063142 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alkanjr, Basmh
Mahgoub, Imad
Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title_full Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title_fullStr Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title_full_unstemmed Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title_short Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
title_sort location privacy-preserving scheme in iobt networks using deception-based techniques
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10052172/
https://www.ncbi.nlm.nih.gov/pubmed/36991852
http://dx.doi.org/10.3390/s23063142
work_keys_str_mv AT alkanjrbasmh locationprivacypreservingschemeiniobtnetworksusingdeceptionbasedtechniques
AT mahgoubimad locationprivacypreservingschemeiniobtnetworksusingdeceptionbasedtechniques