Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
A comprehensive survey of v2x cybersecurity mechanisms and future research paths
R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …
existing transport systems by enabling increased connectivity and driving autonomy levels …
The long road to computational location privacy: A survey
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …
the usage of mobile applications, among which many use location to provide geolocated …
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
As a prime target of the quality of privacy in vehicular ad hoc networks (VANETs), location
privacy is imperative for VANETs to fully flourish. Although frequent pseudonym changing …
privacy is imperative for VANETs to fully flourish. Although frequent pseudonym changing …
[图书][B] Network security: A decision and game-theoretic approach
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …
and risk management, this comprehensive work applies unique quantitative models derived …
A classification of location privacy attacks and approaches
In recent years, location-based services have become very popular, mainly driven by the
availability of modern mobile devices with integrated position sensors. Prominent examples …
availability of modern mobile devices with integrated position sensors. Prominent examples …
How talkative is your mobile device? An experimental study of Wi-Fi probe requests
J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …
mobile devices can request information from access points and accelerate the Wi-Fi …
Independent mix zone for location privacy in vehicular networks
N Guo, L Ma, T Gao - IEEE Access, 2018 - ieeexplore.ieee.org
The sensitive information of vehicles is related to location in vehicular networks. Pseudonym
change is an effective way to protect the location privacy of vehicles, which is to establish a …
change is an effective way to protect the location privacy of vehicles, which is to establish a …
Never walk alone: Uncertainty for anonymity in moving objects databases
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …
attention. According to the fc-anonymity principle, each release of data must be such that …