DOI: 10.1007/978-3-540-73275-4_10
|View full text |Cite
|
Sign up to set email alerts
|

On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
151
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 188 publications
(151 citation statements)
references
References 11 publications
0
151
0
Order By: Relevance
“…Location privacy has been studied over the past decade along two orthogonal dimensions: spatial cloaking through location k-anonymity represented by [17,26,7,32,13,6] and mix-zone based privacy protection and its variations represented by [9,15,16,11,29,25]. However, these approaches are suitable only for snapshot queries and are inadequate and ineffective for protecting location privacy of mobile users with continuous query services.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Location privacy has been studied over the past decade along two orthogonal dimensions: spatial cloaking through location k-anonymity represented by [17,26,7,32,13,6] and mix-zone based privacy protection and its variations represented by [9,15,16,11,29,25]. However, these approaches are suitable only for snapshot queries and are inadequate and ineffective for protecting location privacy of mobile users with continuous query services.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of building mix-zones at road intersections is proposed in [15] and [11]. In [16], a formulation for optimal placement of mix-zones in a road map is discussed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a pseudonym changed by an isolated node can be trivially guessed by an external party, pseudonym changes should be coordinated in regions called mix zones [12,17,25,32]. In this work, we consider that mobile users coordinate pseudonym changes as defined in [32] and achieve location privacy at a low cost.…”
Section: Threat Modelmentioning
confidence: 99%
“…Beresford et al [2] propose the concept of mix zone, an area in which users' movements cannot be observed, and to use entropy of the mix zone to quantify the information obtained by an adversary on the user movements through mix zones. Applying the same principle, the authors in [4,10] use the entropy provided by the mix zones to evaluate the level of location privacy achieved by the vehicles in vehicular ad hoc neworks (VANET). In [9], a flow-based metric is proposed to measure the effectiveness of mix zones and use it as a basis for the optimal placement of mix zones in mobile networks.…”
Section: Related Workmentioning
confidence: 99%