IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
DOI: 10.1109/percomw.2004.1276918
|View full text |Cite
|
Sign up to set email alerts
|

Mix zones: user privacy in location-aware services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
281
0
2

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 346 publications
(283 citation statements)
references
References 6 publications
0
281
0
2
Order By: Relevance
“…Various privacy protection algorithms proposed for data privacy have been adopted for protecting location privacy of mobile users. The types of privacy protection algorithms include anonymization [1,5,8,10,13,20], data suppression [18], trajectory inference prevention [2,3,[14][15][16] and encryption [11]. While most of the existing schemes are aimed at preventing the adversary from distinguishing the location of a given user from that of other users, their perturbation techniques are mostly unidirectional and lack the ability to de-anonymize the perturbed information even when a user accessing the information has suitable credentials for obtaining finer information.…”
Section: Related Workmentioning
confidence: 99%
“…Various privacy protection algorithms proposed for data privacy have been adopted for protecting location privacy of mobile users. The types of privacy protection algorithms include anonymization [1,5,8,10,13,20], data suppression [18], trajectory inference prevention [2,3,[14][15][16] and encryption [11]. While most of the existing schemes are aimed at preventing the adversary from distinguishing the location of a given user from that of other users, their perturbation techniques are mostly unidirectional and lack the ability to de-anonymize the perturbed information even when a user accessing the information has suitable credentials for obtaining finer information.…”
Section: Related Workmentioning
confidence: 99%
“…Instead of using a single pseudonym, mobile devices are preloaded with a set of pseudonyms and change over time the pseudonym used for sending messages. To impede an adversary from linking old and new pseudonyms, the change of pseudonyms must be spatially and temporally coordinated among mobile nodes in regions called mix zones [8]. The analysis in [7,20,21] shows that the achieved location privacy depends on the node density and on the unpredictability of node movements in mix zones.…”
Section: Related Workmentioning
confidence: 99%
“…The graph construction is constrained by (8): The resulting graph G depends on the information collected by the nodes (their knowledge of pseudonyms). In other words, we seek to obtain a graph that maximizes the level of anonymity of every node constrained by the maximum out-degree and using a distributed construction function f (i.e., self-organization).…”
Section: Ring Construction Problemmentioning
confidence: 99%
“…Mix zone [3,4] is the same concept of mix networks taken into the domain of location anonymity. The mix zone concept was added with the Active Bat [35] system to provide location anonymity.…”
Section: Known Usesmentioning
confidence: 99%