With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co...With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.展开更多
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m...The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.展开更多
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi...With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.展开更多
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'...We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.展开更多
It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elabor...It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elaborate a Synergy- aware Selection Mechanism (SSM) considering synergetic among devices. In the SSM, we design a distributed algorithm to integrate the devices and a dynamic updating weight method. The simulation results show that SSM can make devices composed together to ensure the continuity and smoothness of service展开更多
The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and ne...The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture.展开更多
Intelligent robots in ubiquitous computing environment should be able to receive a variety of surrounding informa tion and provide users with appropriate services. A developer can describe the robot services that are ...Intelligent robots in ubiquitous computing environment should be able to receive a variety of surrounding informa tion and provide users with appropriate services. A developer can describe the robot services that are proper to users' envir onments by using his or her various environments, and process them through the execution engine. However, it is difficult for a developer to describe and develop robot services, who knows all surrounding information which is called context infor mation. If there is a method for describing and documenting robot services in intuitive expressions, that is to use graphical user interfaces(GUls), it would be very helpful. This paper suggests that robot service developers describe robot services us ing intuitive GUls with contextawareness. And the services can be automatically generated into workflow documents. Robot services that robot service developers have made with intuitive GUIs can be automatically generated into workflow docu ments by using the object modeling technique(OMT). Developers can describe robot services based on contextaware work flow language(CAWL ). For testing, scenariobased robot services are described using CAWLbased development tool, and their workflow documents are automatically generated.展开更多
Internet takes a role as a place for communication between people beyond a space simply for the acquisition of information.Recently,social network service(SNS)reflecting human’s basic desire for talking and communica...Internet takes a role as a place for communication between people beyond a space simply for the acquisition of information.Recently,social network service(SNS)reflecting human’s basic desire for talking and communicating with others is focused on around the world.And location-based service(LBS)is a service that provides various life conveniences like improving productivity through location information,such as GPS and WiFi.This paper suggests an application combining LBS and SNS based on Android OS.By using smart phone which is personal mobile information equipment,it combines location information with user information and SNS so that the service can be developed.It also maximizes sharing and use of information via twit based on locations of friends.This proposed system is aims for users to show online identity more actively and more conveniently.展开更多
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m...The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as its measurement. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces MUSE in four sections. This section focuses on the system structure of the MUSE service platform.展开更多
Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computationa...Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.展开更多
The Mobile Ubiquitous Service Environment(MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience(ABE),represents the maj...The Mobile Ubiquitous Service Environment(MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience(ABE),represents the major development trend for the next generation mobile wireless network.Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system;and each involves exploration and innovation of a new networking structure,its control and management as well as its measurement.The change in network resources triggers the change in network computing models.To let readers have a basic understanding of MUSE,this lecture introduces MUSE in four sections.This section focuses on the MUSE network architecture and its key technologies.展开更多
The smart home using ubiquitous technology can effectively provide services to the elderly and the physically impaired. However, such services are accompanied by high initial cost of installation and the operating ine...The smart home using ubiquitous technology can effectively provide services to the elderly and the physically impaired. However, such services are accompanied by high initial cost of installation and the operating inefficiency due to the absence of design guidelines. To solve these, the integrated management of the process by supplying the public service like voucher schemes to the dwelling is needed. This paper mainly proposes a research about the healthcare service in a residential environment, which includes medical service and safety service and so on, by surveying the voucher program and the in-house infra status. Finally, the house planning elements for healthcare-based smart home are drawn and the planning directions through expert survey are suggested. Therefore, this study surveyed on voucher program and in-house infra status, and drew the house planning elements for health-based care smart home. In addition, this study suggested the planning direction through expert survey. This study can be used as a guideline for constructing a smart home, which supplies healthcare service.展开更多
<div style="text-align:justify;"> In the era of information and communication technology (ICT) and big data, the map gradually shows a new qualitative feature of “spatiotemporal ubiquitous” due to th...<div style="text-align:justify;"> In the era of information and communication technology (ICT) and big data, the map gradually shows a new qualitative feature of “spatiotemporal ubiquitous” due to the extension of its object space and the geographic information it contains, which brings new challenges to map information organization. This paper analyzes the concept and information characteristics of the ubiquitous map. Based on that, it proposes a ubiquitous map information organization model oriented to location-based aggregation. This new model includes three parts as “ubiquitous map instance”, “location-based aggregation mode” and “map scene”. This paper focuses on the “map scene” part which is the core of the model and contains two mutually mapped aspects as “content scene” and “representation scene”. And both aspects are divided into three levels as “features” ←→ “elements” ←→ “scenes” according to ubiquitous map information characteristics and location-based aggregation mode. With cases of map decomposition, the application of the model is explained to illustrate its effectiveness. The model is expected to provide powerful data organization and management capabilities for ubiquitous map production and use. </div>展开更多
Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In add...Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.展开更多
Since smartphones embedded with positioning systems and digital maps are widely used,location-based services(LBSs)are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives;howe...Since smartphones embedded with positioning systems and digital maps are widely used,location-based services(LBSs)are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives;however,they also cause great concern about privacy leakage.In particular,location queries can be used to infer users’sensitive private information,such as home addresses,places of work and appointment locations.Hence,many schemes providing query anonymity have been proposed,but they typically ignore the fact that an adversary can infer real locations from the correlations between consecutive locations in a continuous LBS.To address this challenge,a novel dual privacy-preserving scheme(DPPS)is proposed that includes two privacy protection mechanisms.First,to prevent privacy disclosure caused by correlations between locations,a correlation model is proposed based on a hidden Markov model(HMM)to simulate users’mobility and the adversary’s prediction probability.Second,to provide query probability anonymity of each single location,an advanced k-anonymity algorithm is proposed to construct cloaking regions,in which realistic and indistinguishable dummy locations are generated.To validate the effectiveness and efficiency of DPPS,theoretical analysis and experimental verification are further performed on a real-life dataset published by Microsoft,i.e.,GeoLife dataset.展开更多
As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed f...As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed for specific applications, having data communication protocols tightly coupled to applications. To avoid these problems, several kinds of USN middleware have been researched and developed. However, most middleware of USN are still restricted by its own infrastructure so far. This paper proposes appropriate 3 tier Smart Middleware System (3SMS) for USN.展开更多
The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time perfor...The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance.展开更多
基金This work has been partly supported by the National Natural Science Foundation of China under Grant No.61702212the Fundamental Research Funds for the Central Universities under Grand NO.CCNU19TS017.
文摘With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.
文摘The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.
基金This work was supported by National Natural Science Foundation of China(Grant Nos.61871140,61702223,61702220,61572153,61723022,61601146)and the National Key research and Development Plan(Grant No.2018YFB0803504,2017YFB0803300).
文摘With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.
文摘We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.
文摘It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elaborate a Synergy- aware Selection Mechanism (SSM) considering synergetic among devices. In the SSM, we design a distributed algorithm to integrate the devices and a dynamic updating weight method. The simulation results show that SSM can make devices composed together to ensure the continuity and smoothness of service
文摘The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture.
基金The MKE(The Ministry of Knowledge Economy),Korea,under the ITRC(Infor mation Technology Research Center)support programsupervised by the NIPA(National ITIndustry Promotion Agency)(NIPA-2012-H0301-12-2006)
文摘Intelligent robots in ubiquitous computing environment should be able to receive a variety of surrounding informa tion and provide users with appropriate services. A developer can describe the robot services that are proper to users' envir onments by using his or her various environments, and process them through the execution engine. However, it is difficult for a developer to describe and develop robot services, who knows all surrounding information which is called context infor mation. If there is a method for describing and documenting robot services in intuitive expressions, that is to use graphical user interfaces(GUls), it would be very helpful. This paper suggests that robot service developers describe robot services us ing intuitive GUls with contextawareness. And the services can be automatically generated into workflow documents. Robot services that robot service developers have made with intuitive GUIs can be automatically generated into workflow docu ments by using the object modeling technique(OMT). Developers can describe robot services based on contextaware work flow language(CAWL ). For testing, scenariobased robot services are described using CAWLbased development tool, and their workflow documents are automatically generated.
基金MKE(the Ministry of Knowledge Economy),Korea,under the ITRC(Infor mation Technology Research Center)support program supervised by the NIPA(National IT Industry Promotion Agency)(NIPA-2011-C1090-1121-0010)
文摘Internet takes a role as a place for communication between people beyond a space simply for the acquisition of information.Recently,social network service(SNS)reflecting human’s basic desire for talking and communicating with others is focused on around the world.And location-based service(LBS)is a service that provides various life conveniences like improving productivity through location information,such as GPS and WiFi.This paper suggests an application combining LBS and SNS based on Android OS.By using smart phone which is personal mobile information equipment,it combines location information with user information and SNS so that the service can be developed.It also maximizes sharing and use of information via twit based on locations of friends.This proposed system is aims for users to show online identity more actively and more conveniently.
文摘The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as its measurement. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces MUSE in four sections. This section focuses on the system structure of the MUSE service platform.
文摘Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.
文摘The Mobile Ubiquitous Service Environment(MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience(ABE),represents the major development trend for the next generation mobile wireless network.Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system;and each involves exploration and innovation of a new networking structure,its control and management as well as its measurement.The change in network resources triggers the change in network computing models.To let readers have a basic understanding of MUSE,this lecture introduces MUSE in four sections.This section focuses on the MUSE network architecture and its key technologies.
文摘The smart home using ubiquitous technology can effectively provide services to the elderly and the physically impaired. However, such services are accompanied by high initial cost of installation and the operating inefficiency due to the absence of design guidelines. To solve these, the integrated management of the process by supplying the public service like voucher schemes to the dwelling is needed. This paper mainly proposes a research about the healthcare service in a residential environment, which includes medical service and safety service and so on, by surveying the voucher program and the in-house infra status. Finally, the house planning elements for healthcare-based smart home are drawn and the planning directions through expert survey are suggested. Therefore, this study surveyed on voucher program and in-house infra status, and drew the house planning elements for health-based care smart home. In addition, this study suggested the planning direction through expert survey. This study can be used as a guideline for constructing a smart home, which supplies healthcare service.
文摘<div style="text-align:justify;"> In the era of information and communication technology (ICT) and big data, the map gradually shows a new qualitative feature of “spatiotemporal ubiquitous” due to the extension of its object space and the geographic information it contains, which brings new challenges to map information organization. This paper analyzes the concept and information characteristics of the ubiquitous map. Based on that, it proposes a ubiquitous map information organization model oriented to location-based aggregation. This new model includes three parts as “ubiquitous map instance”, “location-based aggregation mode” and “map scene”. This paper focuses on the “map scene” part which is the core of the model and contains two mutually mapped aspects as “content scene” and “representation scene”. And both aspects are divided into three levels as “features” ←→ “elements” ←→ “scenes” according to ubiquitous map information characteristics and location-based aggregation mode. With cases of map decomposition, the application of the model is explained to illustrate its effectiveness. The model is expected to provide powerful data organization and management capabilities for ubiquitous map production and use. </div>
文摘Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.
基金supported by the National Natural Science Foundation of China(Grant No.62172350)the Fundamental Research Funds for the Central Universities(No.21621028)the Innovation Project of GUET Graduate Education(No.2022YCXS083).
文摘Since smartphones embedded with positioning systems and digital maps are widely used,location-based services(LBSs)are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives;however,they also cause great concern about privacy leakage.In particular,location queries can be used to infer users’sensitive private information,such as home addresses,places of work and appointment locations.Hence,many schemes providing query anonymity have been proposed,but they typically ignore the fact that an adversary can infer real locations from the correlations between consecutive locations in a continuous LBS.To address this challenge,a novel dual privacy-preserving scheme(DPPS)is proposed that includes two privacy protection mechanisms.First,to prevent privacy disclosure caused by correlations between locations,a correlation model is proposed based on a hidden Markov model(HMM)to simulate users’mobility and the adversary’s prediction probability.Second,to provide query probability anonymity of each single location,an advanced k-anonymity algorithm is proposed to construct cloaking regions,in which realistic and indistinguishable dummy locations are generated.To validate the effectiveness and efficiency of DPPS,theoretical analysis and experimental verification are further performed on a real-life dataset published by Microsoft,i.e.,GeoLife dataset.
基金This work is supported by the Second Stage of Brain Korea 21 project in 2007 .
文摘As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed for specific applications, having data communication protocols tightly coupled to applications. To avoid these problems, several kinds of USN middleware have been researched and developed. However, most middleware of USN are still restricted by its own infrastructure so far. This paper proposes appropriate 3 tier Smart Middleware System (3SMS) for USN.
基金supported in part by National Key Research and Development Program under Grant No.2020YFB1708800China Postdoctoral Science Foundation under Grant No.2021M700385+5 种基金Guang Dong Basic and Applied Basic Research Foundation under Grant No.2021A1515110577Guangdong Key Research and Development Program under Grant No.2020B0101130007Central Guidance on Local Science and Technology Development Fund of Shanxi Province under Grant No.YDZJSX2022B019Fundamental Research Funds for Central Universities under Grant No.FRF-MP-20-37Interdisciplinary Research Project for Young Teachers of USTB(Fundamental Research Funds for the Central Universities)under Grant No.FRF-IDRY-21-005National Natural Science Foundation of China under Grant No.62002026。
文摘The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance.