Zheng et al., 2014 - Google Patents
A cloaking-based approach to protect location privacy in location-based servicesZheng et al., 2014
View PDF- Document ID
- 13176062037887202635
- Author
- Zheng J
- Tan X
- Zou C
- Niu Y
- Zhu J
- Publication year
- Publication venue
- Proceedings of the 33rd Chinese Control Conference
External Links
Snippet
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible …
- 238000005457 optimization 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | Location privacy and its applications: A systematic study | |
| Yahuza et al. | Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities | |
| Altuwaiyan et al. | EPIC: efficient privacy-preserving contact tracing for infection detection | |
| Zhang et al. | A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks | |
| Li et al. | Privacy leakage of location sharing in mobile social networks: Attacks and defense | |
| Zhu et al. | Toward privacy preserving and collusion resistance in a location proof updating system | |
| Gao et al. | Location privacy in database-driven cognitive radio networks: Attacks and countermeasures | |
| Song et al. | Blockchain meets COVID-19: A framework for contact information sharing and risk notification system | |
| Zhang et al. | Message in a sealed bottle: Privacy preserving friending in mobile social networks | |
| Zheng et al. | Location based handshake and private proximity test with location tags | |
| Pham et al. | Privacy issues in social networks and analysis: a comprehensive survey | |
| Sun et al. | Network security technology of intelligent information terminal based on mobile internet of things | |
| Wang et al. | Providing location-aware location privacy protection for mobile location-based services | |
| Chen et al. | A survey on security issues of m2m communications in cyber-physical systems. | |
| Chang et al. | Protecting mobile crowd sensing against sybil attacks using cloud based trust management system | |
| Xue et al. | You can yak but you can't hide: localizing anonymous social network users | |
| Albayram et al. | Designing challenge questions for location‐based authentication systems: a real‐life study | |
| Zheng et al. | A cloaking-based approach to protect location privacy in location-based services | |
| Hajian et al. | Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring | |
| Carbunar et al. | A survey of privacy vulnerabilities and defenses in geosocial networks | |
| Ni et al. | A mobile phone‐based physical‐social location proof system for mobile social network service | |
| Zhong et al. | Connecting human to cyber-world: Security and privacy issues in mobile crowdsourcing networks | |
| Salimibeni et al. | TB-ICT: A trustworthy blockchain-enabled system for indoor COVID-19 contact tracing | |
| Jia et al. | Nonexposure Accurate Location K‐Anonymity Algorithm in LBS | |
| Yang et al. | A mechanism to improve effectiveness and privacy preservation for review publication in LBS |