2018
DOI: 10.1155/2018/7823979
|View full text |Cite
|
Sign up to set email alerts
|

NTRU Implementation of Efficient Privacy‐Preserving Location‐Based Querying in VANET

Abstract: The key for location-based service popularization in vehicular environment is security and efficiency. However, due to the constrained resources in vehicle-mounted system and the distributed structure of fog computation, disposing of the conflicts between real-time implementation and user's privacy remains an open problem. Aiming at synchronously preserving the position information for users as well as the data proprietorship of service provider, an efficient location-based querying scheme is proposed in this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…In an alternative strategy, Mi et al 21 introduced privacy‐preserving location‐based querying using NTRU for the VANET network. However, the respective model lacks addressing MITM and Sybil attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…In an alternative strategy, Mi et al 21 introduced privacy‐preserving location‐based querying using NTRU for the VANET network. However, the respective model lacks addressing MITM and Sybil attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Reference [32] proposed a group-oriented privacy security approach oriented on a post-quantum safe forget transfer protocol, built based on an effective NTRU cryptosystem. Similarly, group-led trust and authentication schemes were also discussed in several other studies [44], each with different methods in addition to maintaining the required location services.…”
Section: Group-based Authenticationmentioning
confidence: 99%
“…Trajectory Attack-If a given trajectory is used by an LBS-server recipient to deduce the trajectory [32]. Trajectory assaults will also be carried out even though the user identity has been removes.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…To further analyze the effect of the AECMD algorithm on the performance of meteorological data reduction, the precipitation properties of the data set are reduced with the rough set attribute reduction algorithm based on the Tabu Discrete Particle Swarm Optimization [10,[35][36][37][38][39] (TSDPSO-AR) algorithm. To compare the performance of reduction, the classification of every reduction attribute subset is carried out in the KNN (k-Nearest Neighbor, K=3) classifier.…”
Section: Reduction Performance Analysismentioning
confidence: 99%