2012 International Conference on Computer Science and Electronics Engineering 2012
DOI: 10.1109/iccsee.2012.45
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Protect Model Based on Positioning Middleware among the Internet of Things

Abstract: Internet of Things is not only a platform for communication between people, but also it provides the real-time information exchange between things and things, people and things, things and people. With the popularity of the internet of things, the application services are increasing. However, those services are usually based on the user's location information, which contains user's privacy information directly or indirectly. This paper discussed on how to protect user's location privacy while providing persona… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
(3 reference statements)
0
3
0
Order By: Relevance
“…Another set of research papers defined the location-based privacy for IoT systems. In this context, Liu et al [50] proposed a strategy for how to protect the user's location when there is a personalized service inside the IoT application. The strategy also contains a pseudonym policy and a model for location-based privacy by protecting the user's location information acquisition.…”
Section: Authentication Schemas and Protocols (27)mentioning
confidence: 99%
“…Another set of research papers defined the location-based privacy for IoT systems. In this context, Liu et al [50] proposed a strategy for how to protect the user's location when there is a personalized service inside the IoT application. The strategy also contains a pseudonym policy and a model for location-based privacy by protecting the user's location information acquisition.…”
Section: Authentication Schemas and Protocols (27)mentioning
confidence: 99%
“…Many techniques such as cryptographic algorithms, key management techniques [2], region-based privacypreserving mechanisms [3], based on public key infrastructures (PKI) [6], Certificateless Public Key Cryptography (CL-PKC), and an Identity based (ID) [7][8] [21] [22][24] [25], and signcryption methods [4] were present to address the security issues. From the literature survey, the online/off-line signcryption approach is highly appropriate for IoT since it is finishing most of the operations will be done off-line results increase in performance also concentrating on the security service like authentication, confidentiality, non-repudiation and integration.…”
Section: Introductionmentioning
confidence: 99%
“…On the basis of the studies on the IOT architecture and analysis on the secure threats in IOT, many researches have presented the security architecture or corresponding defensive suggestions of the IOT. Towards security threats of some IOT communication applications, there are several solutions have been researched such as interoperability of security , key management protocol , and location privacy protection . Compared with those schemes in the previous text, the using of online/offline signcryption for IOT application has the following advantages: (1) the security attributes of confidentiality, authentication, integrity and non‐repudiation are achieved simultaneously; and (2) the most of computational overheads is shifted to the offline phase without the knowledge of the particular message to be signcrypted and the receiver's public key/identity.…”
Section: Introductionmentioning
confidence: 99%