Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Pseudonym changing at social spots: An effective strategy for location privacy in VANETs

R Lu, X Lin, TH Luan, X Liang… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
As a prime target of the quality of privacy in vehicular ad hoc networks (VANETs), location
privacy is imperative for VANETs to fully flourish. Although frequent pseudonym changing …

[图书][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

A classification of location privacy attacks and approaches

M Wernke, P Skvortsov, F Dürr, K Rothermel - Personal and ubiquitous …, 2014 - Springer
In recent years, location-based services have become very popular, mainly driven by the
availability of modern mobile devices with integrated position sensors. Prominent examples …

How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …

Independent mix zone for location privacy in vehicular networks

N Guo, L Ma, T Gao - IEEE Access, 2018 - ieeexplore.ieee.org
The sensitive information of vehicles is related to location in vehicular networks. Pseudonym
change is an effective way to protect the location privacy of vehicles, which is to establish a …

Never walk alone: Uncertainty for anonymity in moving objects databases

O Abul, F Bonchi, M Nanni - 2008 IEEE 24th international …, 2008 - ieeexplore.ieee.org
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …