2013
DOI: 10.1002/dac.2650
|View full text |Cite
|
Sign up to set email alerts
|

X‐Region: A framework for location privacy preservation in mobile peer‐to‐peer networks

Abstract: SUMMARYWhile enjoying various LBS (location-based services), users also face the threats of location privacy disclosure. This is because even if the communications between users and LBS providers can be encrypted and anonymized, the sensitive information inside LBS queries may disclose the exact location or even the identity of a user. The existing research on location privacy preservation in mobile peer-to-peer (P2P) networks assumed that users trust each other and directly share location information with eac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 34 publications
(40 reference statements)
0
7
0
Order By: Relevance
“…This section evaluates the performance of our cloaking algorithms compared with the Dual-active [11], the EDA [12], and theX-region algorithm [14]. Our simulated data are generated by the Thomas Brinkhoff generator with a road network of Oldenburg which includes 6105 nodes and 7035 edges.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This section evaluates the performance of our cloaking algorithms compared with the Dual-active [11], the EDA [12], and theX-region algorithm [14]. Our simulated data are generated by the Thomas Brinkhoff generator with a road network of Oldenburg which includes 6105 nodes and 7035 edges.…”
Section: Methodsmentioning
confidence: 99%
“…In this case, an adversary would easily collect others' locations if pretending to be a normal user. To this end, some cloaking algorithms without exposing the collaborators' locations to other peers in the P2P network have been proposed [13,14]. They all have limiations for relying on Wi-Fi received signal strength of adjacent peers or time difference of arrival of beacon signal and the collaborators' blurred region to form a CR.…”
Section: Introductionmentioning
confidence: 99%
“…Mausaji [24] dwelt on the integrated auditing of ERP systems. Privacy and security have been analyzed and modeled in different systems (e.g., [27][28][29][30][31]61]). She and Thruanisingham [26] presented security solution in ERP and directions for secure systems.…”
Section: Background and Motivationmentioning
confidence: 99%
“…She and Thruanisingham [26] presented security solution in ERP and directions for secure systems. Privacy and security have been analyzed and modeled in different systems (e.g., [27][28][29][30][31]61]).…”
Section: Background and Motivationmentioning
confidence: 99%
“…A cloaked region needs to cover all users that reach the agreement and would be used as their locations in their requests. Some P2P schemes [13], [14] achieve location privacy without exposing precise locations between users, however, like most existing P2P schemes, they apply to ad-hoc or opportunistic networks.…”
Section: Introductionmentioning
confidence: 99%