2019
DOI: 10.3390/s19071581
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Framework to Preserve Location Information Privacy in Location-Based Service Applications

Abstract: Recently, the growing ubiquity of location-based service (LBS) technology has increased the likelihood of users’ privacy breaches due to the exposure of their real-life information to untrusted third parties. Extensive use of such LBS applications allows untrusted third-party adversarial entities to collect large quantities of information regarding users’ locations over time, along with their identities. Due to the high risk of private information leakage using resource-constrained smart mobile devices, most L… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 46 publications
0
8
0
Order By: Relevance
“…But the presented method is specifically designed for Vehicular Social Networks. Tefera and Yang 18 considered privacy analysis based on individuals' identity in a location‐based service using the prisoner's dilemma, but their view was to analyze this issue statically.…”
Section: Related Workmentioning
confidence: 99%
“…But the presented method is specifically designed for Vehicular Social Networks. Tefera and Yang 18 considered privacy analysis based on individuals' identity in a location‐based service using the prisoner's dilemma, but their view was to analyze this issue statically.…”
Section: Related Workmentioning
confidence: 99%
“…where R u i (T 1 + (n − 1)T) represents the user reputation score of u i at T 1 + (n − 1)T, and the specific calculation is as in formula (10). According to formula (7),…”
Section: Beta Reputation Mechanismmentioning
confidence: 99%
“…We call the above process that obtains a user's profile connecting user identities attack (CUIA). At present, most researches focus on the protection of user privacy in terms of query content [2,3,[10][11][12] and data publication [8,13,14]. However, for data publication, few studies are investigating the privacy protection of review publication in CSLBSSs.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy is a guarantee that information that is gathered might be only observed or deciphered by the authorized parties. The monitoring application can be misused by the attacker to hunt the animals, hence severely affecting the aim of the monitoring application Location privacy is not just limited to remote WSN, but also information leakage in the location-based services by third party observers [12] and node location privacy in the industrial wireless sensor network [13] is also a big threat to privacy issues.…”
Section: Introductionmentioning
confidence: 99%