2016
DOI: 10.1007/s11277-016-3906-4
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 51 publications
(24 citation statements)
references
References 14 publications
0
23
0
Order By: Relevance
“…In an ideal mix zone, it is equiprobable for x to be any of the users in the entering users set V out , having p x → y = 1true∣normalVouttrue∣. However, in real world, the effectiveness of the mix zone is constrained by many factors, such as the number of road segments at the intersections, the probability distribution between the road segments, the mobile users' travel speed constraint inside the mix zone region, etc . The more uniform the probability distribution is, the higher the entropy is and the more difficult the real user can be identified.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In an ideal mix zone, it is equiprobable for x to be any of the users in the entering users set V out , having p x → y = 1true∣normalVouttrue∣. However, in real world, the effectiveness of the mix zone is constrained by many factors, such as the number of road segments at the intersections, the probability distribution between the road segments, the mobile users' travel speed constraint inside the mix zone region, etc . The more uniform the probability distribution is, the higher the entropy is and the more difficult the real user can be identified.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, it cannot consider that a mix zone might be useful to provide better anonymity for a user, while its entropy is higher than a certain threshold. Henceforth, 2 systems might represent to have similar entropy but produce multiple level of anonymity; because of that, we cannot use entropy measure as the precise guesstimate of the privacy while the mapping probabilities are uneven as described in our road network mix‐zone scenario.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The clustering procedure is used to competitive process shown in Equation . Ni()R=[]1cddistdtoBS()NiAreaMRc where d dist is the maximum distance from the CH node to the area border, AreaM is the length of side of monitoring area, d toBS ( N i ) is the distance from node N i to CH node, R c is the maximum competition radius of node, and c is a parameter used to control the range, which is in Arain et al…”
Section: Proposed Workmentioning
confidence: 99%
“…Many protocols take advantage of routing and time stamp . Routing and time stamps are used to make real‐time decisions about the environment.…”
Section: Introductionmentioning
confidence: 99%