2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00181
|View full text |Cite
|
Sign up to set email alerts
|

Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Several remarkable overviews have summarized the research focuses of location privacy in mobile IoT and potential hotspots in the future [2], [6]- [8]. Normally, there are mainly two categories of location protections in locationbased mobile IoT: cloaking region [3], [4], [9], [10] and dummy [11]- [14].…”
Section: A Location Privacy Protections In Mobile Iotmentioning
confidence: 99%
See 3 more Smart Citations
“…Several remarkable overviews have summarized the research focuses of location privacy in mobile IoT and potential hotspots in the future [2], [6]- [8]. Normally, there are mainly two categories of location protections in locationbased mobile IoT: cloaking region [3], [4], [9], [10] and dummy [11]- [14].…”
Section: A Location Privacy Protections In Mobile Iotmentioning
confidence: 99%
“…On the other hand, dummies are pseudo locations instead of the actual sensing location by sensors in a mobile service request, dummies are usually generated around the actual location by smart components [11]. A typical service request with dummy is first proposed by Yiu [12], which is a valid solution to guarantee location privacy, but it has the issues of inaccuracy, failing to achieve k-anonymity and location diversity.…”
Section: A Location Privacy Protections In Mobile Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, the centralized strategy is not suited in wireless sensor networks. (ii) Complex Queries-The existing system made an attempt in query processing in the shared fashion in wireless sensor networks like range query, curve query, and top-k query [7]. Moreover, the queries are more complicated than those used in the conventional wireless sensor networks in the latest IoT techniques.…”
Section: Introductionmentioning
confidence: 99%