2017
DOI: 10.14569/ijacsa.2017.080847
|View full text |Cite
|
Sign up to set email alerts
|

AES-Route Server Model for Location based Services in Road Networks

Abstract: Abstract-The now ubiquitous use of location based services (LBS), within the mobile computing domain, has enabled users to receive accurate points of interest (POI) to their geo-tagged queries. While location-based services provide rich content, they are not without risks; specifically, the use of LBS poses many serious challenges with respect to privacy protection. Additionally, the efficiency of spatial query processing, and the accuracy of said results, can be problematic when applied to road networks. Exis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 18 publications
(25 reference statements)
0
3
0
Order By: Relevance
“…The advantages of profundity are seen for all matrices in Table 3 and 4. And at the end of the day we've recommended a new ResNet 200 deeper layered model [72][73][74][75]. The other suggestion we've imposed to improve the performance and the accuracy of ResNet is by tuning the batch size and learning rate.…”
Section: Discussion and Recommendationmentioning
confidence: 99%
“…The advantages of profundity are seen for all matrices in Table 3 and 4. And at the end of the day we've recommended a new ResNet 200 deeper layered model [72][73][74][75]. The other suggestion we've imposed to improve the performance and the accuracy of ResNet is by tuning the batch size and learning rate.…”
Section: Discussion and Recommendationmentioning
confidence: 99%
“…When system's this silent mode is terminated location is upgraded to novel one but downside of this approach is, if vehicle's speed is lower than desired then silent period will go long and location will not be upgraded and will keep former which is vulnerable to attack. In the swing and swap method [40], a node can interchange its Identities with imminent and corresponding vehicle to obfuscate the attacker about vehicles but where user is on the less-crowded road or on motorway then this approach is not efficient. In another coordinate transformation technique [41], [42], the user executes some geometric options such as shifting and rotating their location before getting a service from the LBS.…”
Section: B Related Workmentioning
confidence: 99%
“…Moreover, these approaches are reliant on the third trusted party (TTP), which can’t be taken for granted [24]. The SP or TTP can indeed be the internal attackers or partner to a host of external attackers [25]. Furthermore, the users are forced to compromise on the accuracy of their retrieved results [26].…”
Section: Introductionmentioning
confidence: 99%