Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment

被引:1
|
作者
Kim, Jangseong [2 ]
Shon, Taeshik [1 ]
Kim, Kwangjo [2 ]
机构
[1] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 443749, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Informat & Commun, Taejon, South Korea
来源
IEICE TRANSACTIONS ON COMMUNICATIONS | 2011年 / E94B卷 / 03期
关键词
privacy protection; location supporting protocol; ubiquitous; child safety;
D O I
10.1587/transcom.E94.B.686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we establish our child safety system model related to the addressing contradictory issue of wireless sensor networks caused by the mutual authentication and privacy protection of an end-user. Based on the system model, we propose the novel location-aware and privacy-preserving approach for providing child safety over wireless sensor networks. Although we illustrate our protocol over the sensor networks, the proposed protocol can be operated by various wireless networks (e.g., WiFi and UWB) which can support RSSI (Received Signal Strength Indication). Compared to a few previous works, the proposed approach can show the potential of enhancing accuracy with location information, preserve the privacy of an end-user, and provide the capability of controlling the child safety service to an end-user.
引用
收藏
页码:686 / 689
页数:4
相关论文
共 50 条
  • [31] A Novel Location Privacy-Preserving Approach Based on Blockchain
    Qiu, Ying
    Liu, Yi
    Li, Xuan
    Chen, Jiahui
    SENSORS, 2020, 20 (12) : 1 - 12
  • [32] Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 23 - 42
  • [33] Geocon: A Middleware for Location-Aware Ubiquitous Applications
    Belcastro, Loris
    Di Lieto, Giulio
    Lackovic, Marco
    Marozzo, Fabrizio
    Trunfio, Paolo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 234 - 243
  • [34] Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing
    Li, Dongfen
    Lai, Jinshan
    Wang, Ruijin
    Li, Xiong
    Vijayakumar, Pandi
    Alhalabi, Wadee
    Gupta, Brij B.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 144 : 205 - 218
  • [35] Advances in privacy-preserving computing
    Kaiping Xue
    Zhe Liu
    Haojin Zhu
    Miao Pan
    David S. L. Wei
    Peer-to-Peer Networking and Applications, 2021, 14 : 1348 - 1352
  • [36] Advances in privacy-preserving computing
    Xue, Kaiping
    Liu, Zhe
    Zhu, Haojin
    Pan, Miao
    Wei, David S. L.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1348 - 1352
  • [37] Context Integrity Measurement Architecture A privacy-preserving strategy for the era of ubiquitous computing
    Morrison, John
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [38] Privacy-preserving ID-based service provision in ubiquitous computing environments
    Lee, KM
    Lee, SH
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: OTM 2004 WORKSHOPS, PROCEEDINGS, 2004, 3292 : 21 - 22
  • [39] Context-aware privacy-preserving access control for mobile computing
    Herrera, Juan Luis
    Chen, Hsiao-Yuan
    Berrocal, Javier
    Murillo, Juan M.
    Julien, Christine
    PERVASIVE AND MOBILE COMPUTING, 2022, 87
  • [40] Dynamic location privacy mechanism in location-aware system
    Doomum, M. Razvi
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 379 - 384