2021 IEEE Global Communications Conference (GLOBECOM) 2021
DOI: 10.1109/globecom46510.2021.9685993
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving D2D Cooperative Location Verification

Abstract: Device-to-Device (D2D) cooperative location verification allows a device to verify its location with the help of neighbouring devices. It is especially handy in location-based services where location verification is essential. However, the exposure of device location during verification rises a big privacy risk for participants since they have to send their real-time locations to unknown verifiers holding anonymous identities. Thus, a privacy-preserving solution is urgently needed to provide verification witho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Privacy-preserving positioning aims to protect the private information of the participants involved in the positioning process. A variety of privacy-preserving schemes are proposed for both indoor [17] and outdoor [18], [19]. For indoor positioning based on RSS, Konstantinidis et al [20] proposed a scheme based on bloom filter and k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Privacy-preserving positioning aims to protect the private information of the participants involved in the positioning process. A variety of privacy-preserving schemes are proposed for both indoor [17] and outdoor [18], [19]. For indoor positioning based on RSS, Konstantinidis et al [20] proposed a scheme based on bloom filter and k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…Shu et al [18] solved the problem with a new perspective. They first formulated the localization as least-square-error (LSE) estimation and then implemented its secure computation with matrix multiplication and homomorphic encryption.…”
Section: Related Workmentioning
confidence: 99%