[go: up one dir, main page]

Zheng et al., 2014 - Google Patents

A cloaking-based approach to protect location privacy in location-based services

Zheng et al., 2014

View PDF
Document ID
13176062037887202635
Author
Zheng J
Tan X
Zou C
Niu Y
Zhu J
Publication year
Publication venue
Proceedings of the 33rd Chinese Control Conference

External Links

Snippet

With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
Liu et al. Location privacy and its applications: A systematic study
Yahuza et al. Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities
Altuwaiyan et al. EPIC: efficient privacy-preserving contact tracing for infection detection
Zhang et al. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
Li et al. Privacy leakage of location sharing in mobile social networks: Attacks and defense
Zhu et al. Toward privacy preserving and collusion resistance in a location proof updating system
Gao et al. Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Song et al. Blockchain meets COVID-19: A framework for contact information sharing and risk notification system
Zhang et al. Message in a sealed bottle: Privacy preserving friending in mobile social networks
Zheng et al. Location based handshake and private proximity test with location tags
Pham et al. Privacy issues in social networks and analysis: a comprehensive survey
Sun et al. Network security technology of intelligent information terminal based on mobile internet of things
Wang et al. Providing location-aware location privacy protection for mobile location-based services
Chen et al. A survey on security issues of m2m communications in cyber-physical systems.
Chang et al. Protecting mobile crowd sensing against sybil attacks using cloud based trust management system
Xue et al. You can yak but you can't hide: localizing anonymous social network users
Albayram et al. Designing challenge questions for location‐based authentication systems: a real‐life study
Zheng et al. A cloaking-based approach to protect location privacy in location-based services
Hajian et al. Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring
Carbunar et al. A survey of privacy vulnerabilities and defenses in geosocial networks
Ni et al. A mobile phone‐based physical‐social location proof system for mobile social network service
Zhong et al. Connecting human to cyber-world: Security and privacy issues in mobile crowdsourcing networks
Salimibeni et al. TB-ICT: A trustworthy blockchain-enabled system for indoor COVID-19 contact tracing
Jia et al. Nonexposure Accurate Location K‐Anonymity Algorithm in LBS
Yang et al. A mechanism to improve effectiveness and privacy preservation for review publication in LBS