Privacy Protection for Internet of Drones: A Network Coding Approach
This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applications. Unlike the video devices, personal drones with high mobility can track and fo...
Saved in:
Published in | IEEE internet of things journal Vol. 6; no. 2; pp. 1719 - 1730 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.04.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applications. Unlike the video devices, personal drones with high mobility can track and follow an individual, causing both the identity and location privacy issues. However, IoD devices cannot implement complex cryptographic schemes because of limited computing power. To this end, we develop a secure light-weight network coding pseudonym scheme. Our designed two-tier network coding can decouple the stored IoD cloud data from the owner's pseudonyms. Therefore, our proposed network coding-based pseudonym scheme can simultaneously defend against both outside and inside attackers. We implement our proposed two-tier light-weight network coding mechanism when facing untrusted cloud database. Compared to the computationally secure hash-based pseudonym scheme, our proposed scheme achieves the highest unconditional security level, but also can reduce more than 90% of processing time as well as 10% of energy consumption. |
---|---|
AbstractList | This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can provide surveillance and aerial photography applications. Unlike the video devices, personal drones with high mobility can track and follow an individual, causing both the identity and location privacy issues. However, IoD devices cannot implement complex cryptographic schemes because of limited computing power. To this end, we develop a secure light-weight network coding pseudonym scheme. Our designed two-tier network coding can decouple the stored IoD cloud data from the owner’s pseudonyms. Therefore, our proposed network coding-based pseudonym scheme can simultaneously defend against both outside and inside attackers. We implement our proposed two-tier light-weight network coding mechanism when facing untrusted cloud database. Compared to the computationally secure hash-based pseudonym scheme, our proposed scheme achieves the highest unconditional security level, but also can reduce more than 90% of processing time as well as 10% of energy consumption. |
Author | Wang, Li-Chun Chen, Yu-Jia |
Author_xml | – sequence: 1 givenname: Yu-Jia orcidid: 0000-0001-7563-4073 surname: Chen fullname: Chen, Yu-Jia email: allan920693@g2.nctu.edu.tw organization: Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu – sequence: 2 givenname: Li-Chun orcidid: 0000-0002-7883-6217 surname: Wang fullname: Wang, Li-Chun email: lichun@cc.nctu.edu.tw organization: Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu |
BookMark | eNp9kE1PAjEURRujiYj8AOOmievBfkw7M-4I-IEhwgLXTafTahFb7BQN_95OIMa4sJvXxT3v5p0zcOy80wBcYDTEGFXXj9P5ckgQLoekLBji7Aj0CCVFlnNOjn_9T8GgbVcIoYQxXPEemCyC_ZRqBxfBR62i9Q4aH-DURR2cjtAbOAmprr2BI_ik45cPb3DsG-te4GizCV6q13NwYuS61YPD7IPnu9vl-CGbze-n49EsU6SiMZO8wrUhvEQ5prKRyhBEaslrIxukCOOsVpLyHGFtSlKZhlHOGmyMISQvTE374Gq_N9V-bHUbxcpvg0uVgnQPpaNYShX7lAq-bYM2Qtkou8tikHYtMBKdNdFZE501cbCWSPyH3AT7LsPuX-Zyz1it9U--zMukm9FvXEp5Jw |
CODEN | IITJAU |
CitedBy_id | crossref_primary_10_1016_j_sysarc_2020_101955 crossref_primary_10_1109_ACCESS_2023_3244138 crossref_primary_10_1002_cpe_7667 crossref_primary_10_1016_j_comcom_2020_02_067 crossref_primary_10_1080_1206212X_2021_1961366 crossref_primary_10_1109_ACCESS_2024_3375343 crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_3390_electronics12132917 crossref_primary_10_1109_ACCESS_2021_3072030 crossref_primary_10_1007_s41870_023_01202_0 crossref_primary_10_1109_JSEN_2021_3114266 crossref_primary_10_1016_j_sysarc_2022_102821 crossref_primary_10_1109_ACCESS_2020_3019590 crossref_primary_10_32604_cmc_2022_024932 crossref_primary_10_1109_IOTM_0011_2000045 crossref_primary_10_1109_TNSE_2022_3165971 crossref_primary_10_1145_3673225 crossref_primary_10_1016_j_compeleceng_2024_109774 crossref_primary_10_1016_j_iot_2023_100877 crossref_primary_10_1016_j_pmcj_2023_101798 crossref_primary_10_1007_s10586_021_03497_9 crossref_primary_10_1080_23311916_2022_2029080 crossref_primary_10_12677_CSA_2021_119244 crossref_primary_10_1109_TCOMM_2022_3194074 crossref_primary_10_1109_TNSM_2024_3452414 crossref_primary_10_1016_j_comnet_2023_109612 crossref_primary_10_1016_j_jisa_2024_103915 crossref_primary_10_1155_2021_9935780 crossref_primary_10_1109_ACCESS_2020_2973178 crossref_primary_10_1109_ACCESS_2020_2971772 crossref_primary_10_1109_TVT_2019_2915270 crossref_primary_10_1016_j_vehcom_2022_100552 crossref_primary_10_1109_ACCESS_2020_3019367 crossref_primary_10_1109_JIOT_2021_3093116 crossref_primary_10_1109_JIOT_2022_3222968 crossref_primary_10_1109_TVT_2020_3023733 crossref_primary_10_1016_j_iot_2022_100669 crossref_primary_10_1016_j_iot_2023_100883 crossref_primary_10_1016_j_jii_2023_100468 |
Cites_doi | 10.1109/TVT.2016.2531185 10.1109/JSYST.2018.2802493 10.1109/TITS.2015.2495269 10.1109/CISIS.2013.79 10.1109/ICDCS.2005.48 10.1007/978-3-642-23041-7_14 10.1109/ICPPW.2011.6 10.1109/INFCOMW.2014.6849249 10.1109/CICT.2013.6558135 10.1109/TIFS.2017.2713341 10.1109/TPDS.2016.2594763 10.1109/INFCOM.2013.6567110 10.1109/JSYST.2014.2354235 10.1109/MCOM.2017.1700390 10.1109/TMC.2014.2321747 10.1109/COMST.2016.2598968 10.1109/TDSC.2015.2399291 10.1109/LCOMM.2016.2637902 10.1109/MCOM.2017.1700452 10.1109/JSAC.2017.2680845 10.1109/JIOT.2018.2820039 10.1109/ACCESS.2018.2805464 10.1109/MPRV.2003.1186725 10.1109/TC.2015.2456027 10.1109/SP.2009.22 10.1109/TDSC.2012.85 10.1109/TC.2013.167 10.1109/TVT.2016.2554608 10.1109/TPDS.2012.306 10.1109/TMC.2011.237 10.1109/TCCN.2017.2702163 10.1109/ACCESS.2018.2854233 10.1109/JIOT.2016.2587823 10.1109/ACCESS.2016.2526060 10.1109/TPDS.2013.277 10.1109/COMST.2017.2771522 10.1109/TVT.2011.2162864 10.1145/2491266.2491272 10.1109/ACCESS.2016.2537208 10.1109/ACCESS.2018.2811762 10.1109/TPDS.2015.2486772 10.1109/TPDS.2013.2297105 10.1109/ACCESS.2017.2783322 10.1109/MCOM.2018.1700643 10.1109/LCOMM.2013.070113.122816 10.1109/JSAC.2017.2760179 10.2307/2314898 10.1145/1066116.1189037 10.1109/ICCNC.2016.7440649 10.1109/ACCESS.2016.2577036 10.1109/CSNT.2013.59 10.1109/TPDS.2013.164 10.1109/TIFS.2012.2217331 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/JIOT.2018.2875065 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2327-4662 |
EndPage | 1730 |
ExternalDocumentID | 10_1109_JIOT_2018_2875065 8486625 |
Genre | orig-research |
GrantInformation_xml | – fundername: Ministry of Science and Technology, Taiwan grantid: 107-2634-F-009-006 funderid: 10.13039/501100004663 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-a691bf2680413adacf202ba6bfad0c2565bca36401ef829fd5365d1fff2247fb3 |
IEDL.DBID | RIE |
ISSN | 2327-4662 |
IngestDate | Mon Jun 30 12:27:26 EDT 2025 Tue Jul 01 04:07:57 EDT 2025 Thu Apr 24 23:05:03 EDT 2025 Wed Aug 27 02:47:15 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-a691bf2680413adacf202ba6bfad0c2565bca36401ef829fd5365d1fff2247fb3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7563-4073 0000-0002-7883-6217 |
PQID | 2222200515 |
PQPubID | 2040421 |
PageCount | 12 |
ParticipantIDs | ieee_primary_8486625 crossref_citationtrail_10_1109_JIOT_2018_2875065 crossref_primary_10_1109_JIOT_2018_2875065 proquest_journals_2222200515 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-04-01 |
PublicationDateYYYYMMDD | 2019-04-01 |
PublicationDate_xml | – month: 04 year: 2019 text: 2019-04-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE internet of things journal |
PublicationTitleAbbrev | JIoT |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref53 ref52 ref55 ref54 ref10 ref17 ref16 ref19 huang (ref48) 2005 ref18 li (ref35) 2012 ref51 ref50 ref46 ref45 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 lu (ref11) 2012; 61 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 |
References_xml | – ident: ref17 doi: 10.1109/TVT.2016.2531185 – ident: ref36 doi: 10.1109/JSYST.2018.2802493 – ident: ref44 doi: 10.1109/TITS.2015.2495269 – ident: ref24 doi: 10.1109/CISIS.2013.79 – ident: ref23 doi: 10.1109/ICDCS.2005.48 – ident: ref55 doi: 10.1007/978-3-642-23041-7_14 – ident: ref42 doi: 10.1109/ICPPW.2011.6 – ident: ref26 doi: 10.1109/INFCOMW.2014.6849249 – ident: ref21 doi: 10.1109/CICT.2013.6558135 – ident: ref46 doi: 10.1109/TIFS.2017.2713341 – ident: ref20 doi: 10.1109/TPDS.2016.2594763 – ident: ref12 doi: 10.1109/INFCOM.2013.6567110 – ident: ref28 doi: 10.1109/JSYST.2014.2354235 – ident: ref2 doi: 10.1109/MCOM.2017.1700390 – ident: ref15 doi: 10.1109/TMC.2014.2321747 – ident: ref52 doi: 10.1109/COMST.2016.2598968 – ident: ref16 doi: 10.1109/TDSC.2015.2399291 – ident: ref18 doi: 10.1109/LCOMM.2016.2637902 – ident: ref4 doi: 10.1109/MCOM.2017.1700452 – ident: ref43 doi: 10.1109/JSAC.2017.2680845 – ident: ref8 doi: 10.1109/JIOT.2018.2820039 – ident: ref45 doi: 10.1109/ACCESS.2018.2805464 – ident: ref9 doi: 10.1109/MPRV.2003.1186725 – ident: ref41 doi: 10.1109/TC.2015.2456027 – ident: ref50 doi: 10.1109/SP.2009.22 – ident: ref13 doi: 10.1109/TDSC.2012.85 – ident: ref37 doi: 10.1109/TC.2013.167 – ident: ref27 doi: 10.1109/TVT.2016.2554608 – ident: ref53 doi: 10.1109/TPDS.2012.306 – ident: ref10 doi: 10.1109/TMC.2011.237 – ident: ref5 doi: 10.1109/TCCN.2017.2702163 – ident: ref51 doi: 10.1109/ACCESS.2018.2854233 – start-page: 1187 year: 2005 ident: ref48 article-title: Enhancing wireless location privacy using silent period publication-title: Proc IEEE Wireless Commun Netw Conf – ident: ref47 doi: 10.1109/JIOT.2016.2587823 – ident: ref31 doi: 10.1109/ACCESS.2016.2526060 – ident: ref19 doi: 10.1109/TPDS.2013.277 – ident: ref33 doi: 10.1109/COMST.2017.2771522 – volume: 61 start-page: 86 year: 2012 ident: ref11 article-title: Pseudonym changing at social spots: An effective strategy for location privacy in VANETs publication-title: IEEE Trans Veh Technol doi: 10.1109/TVT.2011.2162864 – ident: ref7 doi: 10.1145/2491266.2491272 – ident: ref1 doi: 10.1109/ACCESS.2016.2537208 – ident: ref6 doi: 10.1109/ACCESS.2018.2811762 – ident: ref38 doi: 10.1109/TPDS.2015.2486772 – ident: ref34 doi: 10.1109/TPDS.2013.2297105 – ident: ref29 doi: 10.1109/ACCESS.2017.2783322 – ident: ref54 doi: 10.1109/MCOM.2018.1700643 – ident: ref14 doi: 10.1109/LCOMM.2013.070113.122816 – ident: ref32 doi: 10.1109/JSAC.2017.2760179 – ident: ref49 doi: 10.2307/2314898 – ident: ref22 doi: 10.1145/1066116.1189037 – ident: ref30 doi: 10.1109/ICCNC.2016.7440649 – ident: ref3 doi: 10.1109/ACCESS.2016.2577036 – start-page: 100 year: 2012 ident: ref35 article-title: CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding publication-title: Proc INFOCOM – ident: ref25 doi: 10.1109/CSNT.2013.59 – ident: ref39 doi: 10.1109/TPDS.2013.164 – ident: ref40 doi: 10.1109/TIFS.2012.2217331 |
SSID | ssj0001105196 |
Score | 2.3371444 |
Snippet | This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones (IoD). Nowadays, drones equipped with... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1719 |
SubjectTerms | Aerial photography Cloud computing Coding Cryptography Cybersecurity Data privacy Drone aircraft Drones Energy consumption Internet Internet of Drones (IoD) Network coding Privacy privacy protection Security Surveillance |
Title | Privacy Protection for Internet of Drones: A Network Coding Approach |
URI | https://ieeexplore.ieee.org/document/8486625 https://www.proquest.com/docview/2222200515 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH4BTl78hUYUTQ-ejBvbunWbNwISJAE5QMJt6c_EaMDgMNG_3nbr0Kgx7rRD2zV97b7vta_fA7jEmJAw9pgTRlHshHGSOikW3BEixlTjKeGFOv94QobzcLSIFjW43t6FkVIWwWfSNa_FWb5Y8Y3ZKuskYUI0X69DXTtu5V2tz_0U35ARYg8ufS_tjO7uZyZ2K3G1VxB5Bj6-QE-RS-XHD7hAlcEejKv-lMEkj-4mZy5__ybV-N8O78OupZeoW86HA6jJ5SHsVakbkF3JTehP1w-vlL-haanToK2DNH1F5QahzNFKof7a6PjfoC6alLHiqLcySIe6Vof8COaD21lv6NiECg7XqJ47lKQ-UwExmkOYCspV4AWMEqao8LgmPxHjFBPtckmVBKkSESaR8JVSGuhjxfAxNJb60yeApB_G2ldTiTZxyBJCOaWRkiI2aUQ1y2mBV411xq3auEl68ZQVXoeXZsY8mTFPZs3TgqttledSauOvwk0z3NuCdqRb0K4MmtnF-JIF5imS2Zz-XusMdnTbaRmQ04ZGvt7Ic801cnZRTLIPwWHPzA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1NTxsxEB1BeoBL0xIQodD6QC9IG_bL3t1KHCICSiBJcwgSt8WfEqIiKGxA9LfwV_hvHe86KaKoNyT2tAd7rfU8-c3Y43kAu1HEWJz4wospTbw4STMvi5T0lEoijnzKZFmdfzBk3bP45JyeL8Hj4i6M1rpMPtMt-1qe5auJnNmtsv00Thn66y6F8lQ_3GOAdnvQ66A1v4fh8dH4sOs5DQFPIpEVHmdZIEzIbJmdiCsuDUb7gjNhuPIl8j0VkkcMowxt0jAzikaMqsAYg9yWGBHhd5fhA_oZNKxuh_3dwQms-8PcUWngZ_snvZ9jmy2WtjAOob4lrGdkV6q3_LPklzx2XIen-QxU6StXrVkhWvL3i-KQ73WKPsFH50CTdoX4z7Ckr9egPhenIG6takBnNL284_KBjKpKFIg_gg46qbZAdUEmhnSmVqngB2mTYZUNTw4nlstJ21VaX4ezN_mXDahd49CbQHQQJxiNmhRBHIuUcck5NVolVigV_bgm-HPb5tLVU7eyHr_yMq7ys9zCIbdwyB0cmrC36HJTFRP5X-OGNe-iobNsE7bnAMrdcnObh_Yp5Xq2Xu_1DVa640E_7_eGp19gFcfJqvSjbagV05neQc-qEF9LgBO4eGu4_AHRYi8B |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy+Protection+for+Internet+of+Drones%3A+A+Network+Coding+Approach&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Chen%2C+Yu-Jia&rft.au=Wang%2C+Li-Chun&rft.date=2019-04-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=6&rft.issue=2&rft.spage=1719&rft.epage=1730&rft_id=info:doi/10.1109%2FJIOT.2018.2875065&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JIOT_2018_2875065 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |