2018
DOI: 10.1109/access.2018.2830300
|View full text |Cite
|
Sign up to set email alerts
|

Clustered Crowd GPS for Privacy Valuing Active Localization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Such vulnerabilities have been prominently identified in smart watches 6 as well as in military cyberattacks a ecting thousands of civilian ships [31]. Despite these limitations, there is active research on building secure and privacy-preserving localization solutions based on GPS by introducing additional protocol and security mechanisms, for instance, GPS-based active crowd localization based on digital signatures and bulletin boards applied for tracking lost items [34,131].…”
Section: A Review On Proof Of Locationmentioning
confidence: 99%
See 1 more Smart Citation
“…Such vulnerabilities have been prominently identified in smart watches 6 as well as in military cyberattacks a ecting thousands of civilian ships [31]. Despite these limitations, there is active research on building secure and privacy-preserving localization solutions based on GPS by introducing additional protocol and security mechanisms, for instance, GPS-based active crowd localization based on digital signatures and bulletin boards applied for tracking lost items [34,131].…”
Section: A Review On Proof Of Locationmentioning
confidence: 99%
“…Proofs of location are performed between witnesses and a prover, whose Bluetooth interactions verify the identities of the involved devices as well as whether the location claims of each device are reachable within the radio coverage supported by the communication technology of the devices. Spatio-temporal mobility patterns of users may influence the verification process and additional measures of verification may be required, for instance, analysis of betweeness in pseudonym correlation graphs [132] or social tracking distance metrics [131]. Periodically changing the device identifiers according to a Poisson distribution prevents the reveal of real identities by observing location proof records [132].…”
Section: A Review On Proof Of Locationmentioning
confidence: 99%
“…Fatih et al [13] used crowd GPS to find the localization of lost object. In order to measure the profit, new parameters were used.…”
Section: B Global Scheduler (Gs)mentioning
confidence: 99%
“…For example, in the healthcare of a home or hospital for detecting the location and activities of the elderly people or patients; 2,3 in smart spaces such as airports, shopping centers, and tourist attractions for location-based services; 4,5 in case of fire for location detection of firefighters and survivors to realize emergency rescue; 6 for indoor environmental monitoring and building energy saving control; 7 as well as for detecting and tracking the location of terrorists in safety protection. 8 Various wireless localization technologies such as GPS, 9 infrared, 10 ultrasonic, 11 and radio frequency (RF) identification 12 have been developed to support the needs of the aforementioned scenarios. The application of these technologies, however, requires the target to be equipped with wireless devices, such as smart phones, ultrasonic receiver nodes, and tags.…”
Section: Introductionmentioning
confidence: 99%