In-Network Trajectory Privacy Preservation

被引:13
作者
Guo, Mingming [1 ]
Jin, Xinyu [2 ]
Pissinou, Niki [1 ]
Zanlongo, Sebastian [1 ]
Carbunar, Bogdan [1 ]
Iyengar, S. S. [1 ]
机构
[1] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33174 USA
[2] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
关键词
Design; Algorithms; Security; Trajectory privacy; wireless sensor networks; location-based services; geosocial networks; PROTECTING LOCATION PRIVACY; K-ANONYMITY; SENSOR; SYSTEM;
D O I
10.1145/2818183
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy concerns hinder the adoptability of such applications. In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based services, and geosocial networks. In each context, we categorize and summarize the main techniques according to their own feathers. Furthermore, we discuss future trajectory privacy research challenges and directions.
引用
收藏
页数:29
相关论文
共 109 条
[1]   Toward a Statistical Framework for Source Anonymity in Sensor Networks [J].
Alomair, Basel ;
Clark, Andrew ;
Cuellar, Jorge ;
Poovendran, Radha .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (02) :248-260
[2]   Buddy tracking - efficient proximity detection among mobile friends [J].
Amir, Arnon ;
Efrat, Alon ;
Myllymaki, Jussi ;
Palaniappan, Lingeshwaran ;
Wampler, Kevin .
PERVASIVE AND MOBILE COMPUTING, 2007, 3 (05) :489-511
[3]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[4]  
[Anonymous], 2010, LECT NOTES ELECTR EN
[5]  
[Anonymous], IEEE GLOB TEL C GLOB
[6]  
[Anonymous], P MOST MAY
[7]  
[Anonymous], 2011, PROC 3 ACM SIGSPATIA, DOI DOI 10.1145/2063212.2063226
[8]   Providing Users' Anonymity in Mobile Hybrid Networks [J].
Ardagna, Claudio A. ;
Jajodia, Sushil ;
Samarati, Pierangela ;
Stavrou, Angelos .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2013, 12 (03)
[9]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[10]   Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability [J].
Bicakci, Kemal ;
Bagci, Ibrahim Ethem ;
Tavli, Bulent .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (02) :205-207