Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-74853-3_22
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding Location Privacy in Wireless Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(41 citation statements)
references
References 14 publications
0
41
0
Order By: Relevance
“…In the first phase, each user U i registers with the coordinator and gets a query ID (the coordinator is selected randomly before the protocol starts). Then, each U i blurs her exact location l i based on her neighbors' imprecise location [12] and submits her cloaked location R i to the LBS. The coordinator sends a description of the query to the LBS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first phase, each user U i registers with the coordinator and gets a query ID (the coordinator is selected randomly before the protocol starts). Then, each U i blurs her exact location l i based on her neighbors' imprecise location [12] and submits her cloaked location R i to the LBS. The coordinator sends a description of the query to the LBS.…”
Section: Related Workmentioning
confidence: 99%
“…It is important to note that in the first phase of Hashem et al's protocol [7], each user blurs her exact location based on her peers' imprecise locations [12]. To achieve this, each user sends a request to her peers and receives their imprecise locations; she then computes her cloaked region as the MBR that includes her exact location and her peers' imprecise locations.…”
Section: Comparisonmentioning
confidence: 99%
“…To achieve this, the accuracy of the disclosed location is reduced so that a user is indistinguishable from at least k − 1 other users. In [11], k-anonymity is achieved by an ad-hoc network formed by the user and surrounding neighbours, while [12] shows how to achieve k-anonymity in a distributed environment where there are multiple non-colluding servers. Anonymisation has a fundamental difference with location sharing.…”
Section: Related Workmentioning
confidence: 99%
“…This way, the service provider can learn the area in which the person is, but not where exactly. Cloaking has been used extensively for providing location privacy [2,5,7,9,16]. …”
Section: Input Attacksmentioning
confidence: 99%
“…A popular approach is location cloaking [2,5,7,9,16], where only coarse-grained, less intrusive location information is given to a location-based service. Other work [1,18] has suggested the usage of pseudonyms to keep a person's identity hidden from a service.…”
Section: Related Workmentioning
confidence: 99%