Research Article
Abstract
References
Information
통신기술이 4G LTE 셀룰러 네트워크에서 5G 모바일 네트워크로 변화되면서 다양한 분야에서 IoT 서비스들을 사용하고 있다. 그러나, IoT 핵심 기술과 활성화 기술이 5G 네트워크와 연결되면서 사용자의 개인 정보가 제3자에게 악용 ‧ 남용 ‧ 갈취 될 수 있다. 본 논문에서는 5G 모바일 네트워크 환경에서 서로 다른 통신 서비스를 사용하는 IoT 사용자의 프라이버시를 안전하게 보호하기 위한 블록체인 기반의 최적화된 사용자 프라이버시 연계 기법을 제안한다. 제안 기법은 IoT 사용자 정보를 다중 블록체인으로 묶어 비공개적으로 빠르게 검증하도록 함으로써 IoT 사용자의 검증을 블록 마이닝으로 탄력적으로 제공한다. 또한, IoT 사용자의 프라이버시를 보전하도록 K-평균 클러스터링 알고리즘을 사용하여 IoT 프라이버시를 요청하는 요청자와 협력자 간에 최적화된 계약(contract)을 제공함으로써 IoT 프라이버시의 다양한 악성 행위를 포착한다.
As communication technology changes from 4G LTE cellular network to 5G mobile network, IoT services are being used in various fields. However, as IoT core technologies and activation technologies are connected to 5G networks, personal information of users can be abused, abused, or extorted by third parties. This paper proposes a blockchain-based optimized user privacy linkage technique to safely protect the privacy of IoT users who use different communication services in a 5G mobile network environment. The proposed technique flexibly provides verification of IoT users through block mining by grouping IoT user information into multiple blockchains and quickly verifying it privately. In addition, various malicious behaviors of IoT privacy are captured by providing optimized contracts between requestors and collaborators requesting IoT privacy using K-mean clustering algorithms to preserve the privacy of IoT users.
- X. Yang, X. Pei, M. Wang, T. Li, and C. Wang, "Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain", IEEE Access, Vol. 8, pp. 144809-144822, 2020.https://doi.org/10.1109/ACCESS.2020.3014510
- M. K. Choi, C. Y. Yeun, and P. H. Seong, "A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology", IEEE Access, Vol. 8, pp. 118732-118740, 2020.https://doi.org/10.1109/ACCESS.2020.3005134
- A. Majumdar and G. Mohan, "Distributed Fractionalized Data Networks For Data Integrity", Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1-3, 2020.https://doi.org/10.1109/ICBC48266.2020.9169392
- S. Yu, X. Chen, L. Yang, D. Wu, M. Bennis, and J. Zhang, "Intelligent Edge: Leveraging Deep Imitation Learning for Mobile Edge Computation Offloading", IEEE Wireless Communications, Vol. 27, No. 1, pp. 92-99, 2020.https://doi.org/10.1109/MWC.001.1900232
- K. Zhang, Y. Zhu, S. Maharjan, and Y. Zhang, "Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things", IEEE Network, Vol. 33, No. 5, pp. 12-19, 2019.https://doi.org/10.1109/MNET.001.1800526
- K. Zhang, Y. Zhu, S. Leng, Y. He, S. Maharjan, and Y. Zhang, "Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics", IEEE Internet of Things Journal, Vol. 6, No. 5, pp. 7635-7647, 2019.https://doi.org/10.1109/JIOT.2019.2903191
- M. Du, K. Wang, Z. Xia, and Y. Zhang, "Differential Privacy Preserving of Training Model in Wireless Big Data With Edge Computing", IEEE Transactions on Big Data, Vol. 6, No. 2, pp. 283-95, 2020.https://doi.org/10.1109/TBDATA.2018.2829886
- C. Xu, J. Ren, D. Zhang, and Y. Zhang, "Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics", IEEE Communication Magazine, Vol. 56, No. 8, pp. 20-25, 2018.https://doi.org/10.1109/MCOM.2018.1701080
- W. Tong, J. Hua, and S. Zhong, "A Jointly Differentially Private Scheduling Protocol for Ridesharing Services", IEEE Transactions on Information Forensics and Security, Vol. 12, No. 10, pp. 2444-2456, 2017.https://doi.org/10.1109/TIFS.2017.2707334
- R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, "A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions", IEEE Communications Surveys & Tutorials, Vol. 22, No. 1, pp. 196-248, 2020.https://doi.org/10.1109/COMST.2019.2933899
- R. Borgaonkar, A. Shaik, N. Asokan, V. Niemi, and J.-P. Seifert, "LTE and IMSI Catcher Myths", Proceeding of the BlackHat Europe, pp. 1-5, 2015.
- A. Taralika, D. Challa, S. Kumar, A. Ojha, and L. Chung, "Secure Authentication to Provide Mobile Access to Shared Network Resources", U.S. Patent Application No. 15/836 641, 2018.
- M. Liyanage, J. Salo, A. Braeken, T. Kumar, S. Seneviratne, and M. Ylianttila, "5G Privacy: Scenarios and Solutions", Proceeding of the IEEE 5G World Forum (5GWF), pp. 197-203, 2018.https://doi.org/10.1109/5GWF.2018.8516981
- Machine Learning Repository, https://archive.ics.uci.edu/ml/datasets.php?format=&task=&att=&area=&numAtt=greater100&numIns=&type=seq&sort=nameDown&view=list, 2021.
- Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici, "Detection of Unauthorized IoT Devices Using Machine Learning Techniques", 2017. preprint arXiv:1709.04647.
- libaom software, https://aomedia.googlesource.com/aom/
- Publisher :The Society of Convergence Knowledge
- Publisher(Ko) :융복합지식학회
- Journal Title :The Society of Convergence Knowledge Transactions
- Journal Title(Ko) :융복합지식학회논문지
- Volume : 10
- No :1
- Pages :41-48
- DOI :https://doi.org/10.22716/sckt.2022.10.1.005


The Society of Convergence Knowledge Transactions






