Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Approach to Managing Privacy in Location-Based Services

During the last few years we have witnessed an increasing turn to location and positioning as an integral part of the interaction with mobile systems. Over the last decade researchers have explored how location based interaction and communication might be used to support novel interactions. Prominent examples include: Location-based services (LBS) and context-aware systems typically exploit the...

متن کامل

A lightweight anonymity & location privacy service

As embedded systems, in their various forms, become ubiquitous, new types of services are offered, aiming to enhance every aspect of the everyday life and allowing users to enjoy pervasive and personalized access to information. Along with the benefits come considerable threats to users’ privacy, as these enhanced services operate on private sensitive information, such as the true identity and ...

متن کامل

Lightweight and Privacy-preserving Location Proofs for Intelligent Transportation Systems

Transportation systems relying on vehicles to collect data for services such as road condition monitoring are vulnerable to malicious vehicles injecting large amounts of fake data. A particularly serious type of attack is that attackers report fake information about numerous places without actually presenting there. In this paper, we present VProof, a vehicle location proof scheme that enables ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HORNET addresses these problems but incurs additional...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Systems, Networks, and Communications

سال: 2010

ISSN: 1687-7381,1687-739X

DOI: 10.1155/2010/749298