Filters








20,054 Hits in 8.2 sec

Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints

Mulugeta Kassaw Tefera, Xiaolong Yang
2019 Information  
In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints.  ...  The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached  ...  We also pleasantly acknowledge the financial assistance and support provided by NSFC. Conflicts of Interest: We declare that there is no conflict of interest in our research article.  ... 
doi:10.3390/info10040121 fatcat:x5wyd4qclnfclhw6kketo2vjni

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

2019 KSII Transactions on Internet and Information Systems  
In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications.  ...  In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular.  ...  Therefore, the presence of such malicious or selfish behaviors may have an adverse effect on privacy protection system.  ... 
doi:10.3837/tiis.2019.06.024 fatcat:io2zsbg2nzdpzjo4ai3oiztypy

Cognitive Networking for Next-G Wireless Communications

Qingqi Pei, Pin-Han Ho, Yao Liu, Qinghua Li, Lin Chen
2016 International Journal of Distributed Sensor Networks  
High quality of service (QoS) will cause location privacy disclosure easily. However, most of existing methods pay less attention to trade-off between location privacy protection and QoS.  ...  (i) With the popularization of location-based service (LBS), location privacy security has become an increasingly serious problem.  ... 
doi:10.1155/2016/9172605 fatcat:kq4iek6ehfgdnngt3qwq7rqiou

Quality of Services Improvement for Secure Iot Networks

2019 International Journal of Engineering and Advanced Technology  
Successful implementation of IoT depends on the amount of data that is being either transmitted or received over the networks, ensuring quality of services (QoS) and the methods adopted to fight the energy  ...  In this paper we have tried to study the algorithms that have been used to preserve location of source and sink nodes to protect it from breaching and also tried to analyze the effect of these security  ...  This imposes a great challenge in the utilization of security and privacy algorithms for the energy constraint IoT devices.  ... 
doi:10.35940/ijeat.b3757.129219 fatcat:gekxcyeltbdupck5fyfw3gtiqu

Data Security in Smart Cities: Challenges and Solutions

Daniela POPESCUL, Laura Diana RADU
2016 Informatică economică  
Specific data-security requirements and solutions are approached in a four-layer framework, with elements considered to be critical to the operation of a smart city: smart things, smart spaces, smart systems  ...  As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture etc., the paper will serve them as a start  ...  Also, a lot of sensors are used to monitor air quality and pollution, auto and pedestrian traffic, bridges' resistance and road infrastructure in general, criminality rates and policing, energy and water  ... 
doi:10.12948/issn14531305/20.1.2016.03 fatcat:nqg437fu4jfv5a32cmgwefcbt4

Task Allocation in Mobile Crowd Sensing: State of the Art and Future Opportunities [article]

Jiangtao Wang, Leye Wang, Yasha Wang, Daqing Zhang, Linghe Kong
2018 arXiv   pre-print
In this article, we specifically focus on the task allocation in MCS systems.  ...  Task allocation is a fundamental research issue in MCS, which is crucial for the efficiency and effectiveness of MCS applications.  ...  There have been proposed a spectrum of location privacy preserving techniques for location-based services, and many of them have also been successfully adopted in MCS [67] .  ... 
arXiv:1805.08418v2 fatcat:m7ajfuob6rd7hdxsejsrm5rwmu

Ieee Access Special Section Editorial: Cloud and Big Data-Based Next-Generation Cognitive Radio Networks

Nan Zhao, Xin Liu, F. Richard Yu, Yunfei Chen, Tao Han, Zheng Chang
2019 IEEE Access  
NAN ZHAO (S'08-M'11-SM'16) received the B.S. degree in electronics and information engineering, the M.E. degree in signal and information processing, and the Ph.D. degree in information and communication  ...  engineering from the Harbin Institute of Technology, Harbin,  ...  total network energy consumption and guarantee the quality of service.  ... 
doi:10.1109/access.2019.2960172 fatcat:dsc366lsknaxxm52soxtd564qe

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things

Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal
2019 Security and Communication Networks  
The expanded attack surface and the lack of effective security and privacy protection measures are still one of the barriers of widely deploying applications on the IoT/fog/cloud infrastructure.  ...  However, these state-of-the-art computing infrastructures still suffer from severe security and privacy threats because of their built-in properties such as the ubiquitous-access and multitenancy features  ...  Acknowledgments We would also like to cordially thank all the reviewers who have participated in the review process of the articles submitted to this special issue and the special issue coordinators and  ... 
doi:10.1155/2019/4529757 fatcat:ehi3or2qtbdtzluyvgr5libxpe

Uncertainty in IoT for Smart Healthcare: Challenges, and Opportunities [chapter]

Anis Tissaoui, Malak Saidi
2020 Lecture Notes in Computer Science  
The aim of the article is to analyze the factors that may determine the uncertainty and ambiguity of such systems in the context of the development of Healthcare, and recommendations are made for future  ...  In this article the concept of the IoT is treated as a big, complex, dynamic system with specific characteristics, dimensions. structures and behaviors.  ...  ; -Quality of Services (QoS): the quality of services is an important parameter used in the healthcare services which is a highly time-sensitive system.  ... 
doi:10.1007/978-3-030-51517-1_19 fatcat:qj7v5bbtlfbddcgyyw5cpl754i

Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things

Mamoona Humayun, Nz Jhanjhi, Madallah Alruwailli, Sagaya Sabestinal Amalathas, Venki Balasubramaniam, Buvana Selvaraj
2020 IEEE Access  
Therefore, privacy at all three levels (data, identity and location) need to be maintained.  ...  In today's fast-paced economy, almost every sector of the economy is dependent on energy resources.  ...  IIoT devices enable smart energy systems by providing support in various dimensions of energy system including: demand services, regulations and marketing, generation, transmission and distribution [25  ... 
doi:10.1109/access.2020.3028764 fatcat:6hrt3bntnfbsre7zuczeetygde

Smart Parking with Fair Selection and Imposing Higher Privacy Constraints in Parking Owner and Driver Information

Vivekanadam B
2021 IRO Journal on Sustainable Wireless Systems  
In this proposed work, we have introduced a smart-parking system that is based on blockchain exhibiting qualities of privacy protection, reliability and fairness.  ...  However, most parking lot owners and drivers face the threat of privacy which affects their willingness to participate while many others are located in a centralized location where the presence of malicious  ...  To protect the privacy of location, the parking spot location is initially converted into grid coordinates that are correlated with a particular area within a particular city.  ... 
doi:10.36548/jsws.2021.1.002 fatcat:r3lpfjw7crfizmehii5dshc5sy

Blockchain-Based Security Services for Fog Computing [chapter]

Arvind W. Kiwelekar, Pramod Patil, Laxman D. Netak, Sanjay U. Waikar
2021 Advances in Information Security  
A centralized server either at the level of cloud or fog, has been found ineffective to provide a high degree of security and privacy-preserving services.  ...  The chapter describes the potential of blockchain technology to realize security services such as authentication, secured communication, availability, privacy and trust management to support the development  ...  Promptly detecting and protecting against such threats can save lives in Health and IIS domains. Privacy Most of the Fog applications track personal information to provide personalized services.  ... 
doi:10.1007/978-3-030-57328-7_11 fatcat:fhkmalgqoja4xe6khz6ur7urtq

Towards resilient cyber-physical systems: The ADREAM project

Jean Arlat, Michel Diaz, Mohamed Kaaniche
2014 2014 9th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)  
Advances recently witnessed in pervasive and ubiquitous information processing, driven by major breakthroughs in current cyber-physical systems (CPS) are paving the way towards a more hospitable and sustainable  ...  This paper illustrates several of these challenges and briefly presents the research activities conducted as part of the ADREAM program, with a special highlight on dependability and resilience issues.  ...  ACKNOWLEDGMENT We thank all the people at LAAS and CNRS who have contributed to the definition and development of the ADREAM project.  ... 
doi:10.1109/dtis.2014.6850642 dblp:conf/dtis/ArlatDK14 fatcat:wewutmurqnezvaumhtppl537iq

A Research on Mobile Cloud Computing and Future Trends

Fei Gu, Jianwei Niu, Zhenxue He
2016 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
In this paper, we give a definition of mobile cloud computing and provide an overview of state-of-the-art progress, in particular, models of mobile cloud applications.  ...  With an exploding growth of the mobile applications and emerging of cloud computing, mobile cloud computing (MCC) has become a potential technology for mobile services.  ...  The presence service will implement location privacy policies according to what are stipulated by the mobile subscribers.  ... 
doi:10.4108/eai.21-4-2016.151159 fatcat:h5fsgpvvujdbtmiku4nwz5wahe

Secure Wireless Multimedia Sensor Networks: A Survey

Luigi Alfredo Grieco, Gennaro Boggia, Sabrina Sicari, Pietro Colombo
2009 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies  
the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes.  ...  In order to ensure a broad deployment of such innovative services, strict requirements on security, privacy, and distributed processing of multimedia contents should be satisfied, taking also into account  ...  manage security/privacy policies and Quality of Service (QoS).  ... 
doi:10.1109/ubicomm.2009.27 fatcat:ut62puz7pjfh3ccq2yud7x5jmi
« Previous Showing results 1 — 15 out of 20,054 results