2016
DOI: 10.1109/access.2016.2607766
|View full text |Cite
|
Sign up to set email alerts
|

A Location Cloaking Algorithm Based on Combinatorial Optimization for Location-Based Services in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…Most mobile applications require permission to access a user's personal information before installing them, but do not mention where this data is stored and for what purpose it is used. Some threats target the user's privacy such as semantic information attacks, timing attacks [10]. Effect on 5G networks of different parties such as Virtual MNOs (VMNOs), Communication Service, Providers (CSPs) and network infrastructure providers, each one of them has its security and privacy, policies.…”
Section: Data Securitymentioning
confidence: 99%
“…Most mobile applications require permission to access a user's personal information before installing them, but do not mention where this data is stored and for what purpose it is used. Some threats target the user's privacy such as semantic information attacks, timing attacks [10]. Effect on 5G networks of different parties such as Virtual MNOs (VMNOs), Communication Service, Providers (CSPs) and network infrastructure providers, each one of them has its security and privacy, policies.…”
Section: Data Securitymentioning
confidence: 99%
“…The application developers or companies rarely mention that how the data is stored and for what purposes it is going to be used. Threats such as semantic information attacks, timing attacks, and boundary attacks mainly target the location privacy of subscribers [26]. At the physical layer level, location privacy can be leaked by access point selection algorithms in 5G mobile networks [27].…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…For Radio Access Network (RAN) security, a cloud based framework i.e. C-RAN is proposed for optimizing and provid- [34], [35] Security of centralized control points Configuration verification [36], [37] Flow rules verification in SDN switches Access control [38], [39] [40] Control access to SDN and core network elements Traffic isolation [41] Ensures isolation for VNFs and virtual slices Link security [42], [24], [43] Provide security to control channels Identity verification [44], [45], [46] User identity verification for roaming and clouds services Identity security [47], [48] Ensure identity security of users Location security [26], [27] Ensure security of user location IMSI security [49] Secure the subscriber identity through encryption Mobile terminal security [7] Anti-maleware technologies to secure mobile terminals Integrity verification [50] Security of data and storage systems in clouds HX-DoS metigation [9] Security for cloud web services Service access Control [51] Service-based access control security for clouds ing safer RANs for 5G clouds. In [52], authors described how C-RAN can dynamically enhance the end-to-end performance of MCC services in next generations wireless networks.…”
Section: A Security Solutions For Mobile Cloudsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, most recent research efforts focus only on services provided directly to humans that use related devices for position tracking. The most prominent technology today in this context is based on 5G mobile communications [5] and the most widely deployed user devices designed to support 5G communications, generally named as smartphones (i.e., mobile phones usually supporting a common operating system such as Android and iOS and equipped with compatible subsystems and applications to support related services). With the advent of the Internet of things (IoT) and machine-to-machine (M2M) communications, IPS services can offer much more than human path-finding solutions.…”
Section: Introductionmentioning
confidence: 99%