2014 IEEE Military Communications Conference 2014
DOI: 10.1109/milcom.2014.23
|View full text |Cite
|
Sign up to set email alerts
|

A DTN Routing Protocol for Vehicle Location Information Protection

Abstract: EVWUDFW²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… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…In an effort to apply DTN to IoV, several routing protocols suitable for traffic applications have been proposed in recent years. Dunbar et al 19 proposed a routing protocol to protect vehicle position in IoV for privacy. Mostofa et al 16 proposed a novel framework and an adaptive geographical DTN routing (AGDR) method for VDTNs.…”
Section: Related Workmentioning
confidence: 99%
“…In an effort to apply DTN to IoV, several routing protocols suitable for traffic applications have been proposed in recent years. Dunbar et al 19 proposed a routing protocol to protect vehicle position in IoV for privacy. Mostofa et al 16 proposed a novel framework and an adaptive geographical DTN routing (AGDR) method for VDTNs.…”
Section: Related Workmentioning
confidence: 99%
“…personal information, residence, work, hobbies, interest profiles, etc., which is used for forwarding is protected in [9], [10]. In [11], the location information of individual vehicles during its communication with RSUs is protected. However, privacy issues resulting from V2V communications are not considered.…”
Section: Related Workmentioning
confidence: 99%
“…However, the statistic data might fail in the real scenario. Dunbar and Qu [11] applied the statistic method to preventing the location information of vehicles leaking by communication with RSUs. Hui et al [12] binned the nodes into several areas according to their encountering probabilities simultaneously taking into account the community attribute and center degree.…”
Section: Related Workmentioning
confidence: 99%