2016
DOI: 10.1007/s11042-016-4154-z
|View full text |Cite
|
Sign up to set email alerts
|

DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 62 publications
(91 citation statements)
references
References 69 publications
0
88
0
1
Order By: Relevance
“…Beresford and Stajano refined a method, named the mix zone, introduced to increase user privacy in location‐based services. Memon et al proposed a Dynamic Pseudonym based Multiple Mix‐zones algorithm to obtain the highest level of performance and confidentiality. The idea of executing dynamic pseudonym alteration has been forwarded through respect to pseudonyms and the velocity and direction of moving objects.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Beresford and Stajano refined a method, named the mix zone, introduced to increase user privacy in location‐based services. Memon et al proposed a Dynamic Pseudonym based Multiple Mix‐zones algorithm to obtain the highest level of performance and confidentiality. The idea of executing dynamic pseudonym alteration has been forwarded through respect to pseudonyms and the velocity and direction of moving objects.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In different directions, Memon et al propose the concept of mix context. To hold the pseudonym for stable time, the vehicle assesses its context (ie, neighborhood information) in search for mix context.…”
Section: Related Workmentioning
confidence: 99%
“…In order to achieve road network applications, vehicles are required to broadcast periodic beacons into their direct neighborhood and occasionally event‐based messages (eg, safety messages) as shown in Figure . These messages reported sensitive personal information about their senders such as the identity and location of the vehicle . Due to the open nature of the wireless environment, the private information regarding drivers and their activities was exposed.…”
Section: Introductionmentioning
confidence: 99%
“…Many protocols take advantage of routing and time stamp . Routing and time stamps are used to make real‐time decisions about the environment.…”
Section: Introductionmentioning
confidence: 99%