Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy
نویسندگان
چکیده
منابع مشابه
A Lightweight Approach to Managing Privacy in Location-Based Services
During the last few years we have witnessed an increasing turn to location and positioning as an integral part of the interaction with mobile systems. Over the last decade researchers have explored how location based interaction and communication might be used to support novel interactions. Prominent examples include: Location-based services (LBS) and context-aware systems typically exploit the...
متن کاملA lightweight anonymity & location privacy service
As embedded systems, in their various forms, become ubiquitous, new types of services are offered, aiming to enhance every aspect of the everyday life and allowing users to enjoy pervasive and personalized access to information. Along with the benefits come considerable threats to users’ privacy, as these enhanced services operate on private sensitive information, such as the true identity and ...
متن کاملLightweight and Privacy-preserving Location Proofs for Intelligent Transportation Systems
Transportation systems relying on vehicles to collect data for services such as road condition monitoring are vulnerable to malicious vehicles injecting large amounts of fake data. A particularly serious type of attack is that attackers report fake information about numerous places without actually presenting there. In this paper, we present VProof, a vehicle location proof scheme that enables ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملPHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer
We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HORNET addresses these problems but incurs additional...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Systems, Networks, and Communications
سال: 2010
ISSN: 1687-7381,1687-739X
DOI: 10.1155/2010/749298