2017
DOI: 10.1007/s11042-017-4469-4
|View full text |Cite
|
Sign up to set email alerts
|

Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 59 publications
(47 citation statements)
references
References 52 publications
0
46
0
1
Order By: Relevance
“…In an ideal mix zone, it is equiprobable for x to be any of the users in the entering users set V out , having p x → y = 1true∣normalVouttrue∣. However, in real world, the effectiveness of the mix zone is constrained by many factors, such as the number of road segments at the intersections, the probability distribution between the road segments, the mobile users' travel speed constraint inside the mix zone region, etc . The more uniform the probability distribution is, the higher the entropy is and the more difficult the real user can be identified.…”
Section: Resultsmentioning
confidence: 99%
“…In an ideal mix zone, it is equiprobable for x to be any of the users in the entering users set V out , having p x → y = 1true∣normalVouttrue∣. However, in real world, the effectiveness of the mix zone is constrained by many factors, such as the number of road segments at the intersections, the probability distribution between the road segments, the mobile users' travel speed constraint inside the mix zone region, etc . The more uniform the probability distribution is, the higher the entropy is and the more difficult the real user can be identified.…”
Section: Resultsmentioning
confidence: 99%
“…The trust composition module can composite event trust value, pseudonym life, vehicle change pseudonyms inside mix zone and also outside change pseudonyms through report server (RS), and historical reputation value in order to enable the compensation of the attack messages. The RS trust combination module can composite multiple pieces of event message trust value that received the same event with a different vehicle, also assigning pseudonyms inside mix zones and outside of mix zones through RS …”
Section: Proposed Methodsmentioning
confidence: 99%
“…T rep can be calculated by event reputation as follows: Trep()t={0.96emnormalℂTrep()t()normalt1,if0.25em()Tevttrue)()t=0true)normalℚtrue(Tevttrue)()t+()1normalℚTrep()t()normalt1,else. …”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many protocols take advantage of routing and time stamp . Routing and time stamps are used to make real‐time decisions about the environment. Different environmental parameters are merged as per predefined rules, and a decision is being made.…”
Section: Introductionmentioning
confidence: 99%