A novel location privacy-preserving approach based on blockchain
Y Qiu, Y Liu, X Li, J Chen - Sensors, 2020 - mdpi.com
Location-based services (LBS) bring convenience to people's lives but are also
accompanied with privacy leakages. To protect the privacy of LBS users, many location …
accompanied with privacy leakages. To protect the privacy of LBS users, many location …
A Lightweight Location‐Aware Fog Framework (LAFF) for QoS in Internet of Things Paradigm
Realization of Internet of Things (IoT) has revolutionized the scope of connectivity and
reachability ubiquitously. Under the umbrella of IoT, every object which is smart enough to …
reachability ubiquitously. Under the umbrella of IoT, every object which is smart enough to …
[PDF][PDF] Preserving location privacy in the IoT against advanced attacks using deep learning
AS Alyousef, K Srinivasan, MS Alrahhal… - International Journal of …, 2022 - academia.edu
Location-based services (LBSs) have received a significant amount of recent attention from
the research community due to their valuable benefits in various aspects of society. In …
the research community due to their valuable benefits in various aspects of society. In …
Review and open challenges of public safety networks to manage emergency settings in 5G
Emergency settings are actually being strengthened by using Information and
Communication Technologies (ICT) for the dynamic deployment of a Public Safety Network …
Communication Technologies (ICT) for the dynamic deployment of a Public Safety Network …
Microaggregation-Based Defense Against Synonymous Linkages in IIoT Asset Tracking
AH Eyeleko, T Feng, Y Yan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In the era of Industry 4.0, the proliferation of location-based services (LBSs) and Industrial
Internet of Things (IIoT) asset tracking has revolutionized supply chains and smart …
Internet of Things (IIoT) asset tracking has revolutionized supply chains and smart …
L3Fog: fog node selection and task offloading framework for mobile IoT
The mobility of end users in fog-computing environment necessitates the need for task
offloading and migration. But, the resource-constrained nature of the fog devices makes …
offloading and migration. But, the resource-constrained nature of the fog devices makes …
Comprehensive location privacy enhanced model
With the increasing popularity of location-based services (LBSs), safeguarding location
privacy has become critically important. Traditional methods often struggle to balance the …
privacy has become critically important. Traditional methods often struggle to balance the …
RETRACTED: W-GPCR Routing Method for Vehicular Ad Hoc Networks
M Li, Z Gu, Y Long, X Shu, Q Rong, Z Ma, X Shao - Sensors, 2020 - mdpi.com
The high-speed dynamics of nodes and rapid change of network topology in vehicular ad
hoc networks (VANETs) pose significant challenges for the design of routing protocols …
hoc networks (VANETs) pose significant challenges for the design of routing protocols …
Location privacy protection scheme of user collaborative probabilistic indistinguishability based on Hyperledger Fabric
L Zhang, Y Bai, S Lin, S Lian, Y Geng, Z Liu - The Journal of …, 2025 - Springer
With the widespread application of location-based services (LBS), the issue of location
privacy protection has garnered increasing attention. To address the challenge of balancing …
privacy protection has garnered increasing attention. To address the challenge of balancing …
Privacy and Security in the IT Project Management
AA Abi Sen, AAH Hakami, NM Bahbouh… - … on Computing for …, 2024 - ieeexplore.ieee.org
The data has become the wealth and the most crucial element on which modern
applications and systems rely. However, on the dark side, the threats these applications face …
applications and systems rely. However, on the dark side, the threats these applications face …