Privacy-preserving location-based traffic density monitoring

L Wu, X Wei, L Meng, S Zhao, H Wang - Connection Science, 2022 - Taylor & Francis
Traffic density monitoring is an important method to predict road traffic conditions, which can
bring some convenience to people's travel in daily life. The common method of traffic density …

An efficient and privacy-preserving information reporting framework for traffic monitoring in vehicular networks

C Gu, X Cui, M Li, D Hu - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Traffic monitoring services show great potential for improving traffic efficiency in vehicular
networks. With the assistance of 5G innovation, vehicles can report information such as …

An improved Apriori–based algorithm for friends recommendation in microblog

L Liu, S Yu, X Wei, Z Ning - International Journal of …, 2018 - Wiley Online Library
With the rapid development of Internet, the world has come into a new era of network
interaction. Internet development in China makes various kinds of software available to …

Privacy‐preserving multilevel obfuscation scheme for vehicular network

I Ullah, MA Shah, A Khan, G Jeon - Transactions on Emerging …, 2021 - Wiley Online Library
For accessing various location‐based services (LBS), a device needs to update its location
frequently. The vehicle requires to exchange location messages with LBS while moving on …

Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review

B Ma, X Wang, X Lin, Y Jiang, C Sun, Z Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Location privacy is critical in vehicular networks, where drivers' trajectories and personal
information can be exposed, allowing adversaries to launch data and physical attacks that …

Multiple mix zones de-correlation trajectory privacy model for road network

I Memon, HT Mirza, QA Arain, H Memon - Telecommunication Systems, 2019 - Springer
Preserving privacy of vehicle movement is an important challenge in road networks; as
trajectory data with spatiotemporal information may reveal much individual information. One …

Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

MT Mamaghani, A Kuhestani, H Behroozi - Wireless Networks, 2021 - Springer
Cooperative relaying is utilized as an efficient method for data communication in wireless
sensor networks and the Internet of Things. However, sometimes due to the necessity of …

Distance and clustering‐based energy‐efficient pseudonyms changing strategy over road network

I Memon - International Journal of Communication Systems, 2018 - Wiley Online Library
To improve the fairness, the energy consumption changing pseudonyms needs to be taken
into account. Existing works focus on changing velocity‐based pseudonyms changing …

A secure authentication and key agreement scheme for roaming service with user anonymity

H Arshad, A Rasoolzadegan - International Journal of …, 2017 - Wiley Online Library
Nowadays, with the advancement of wireless technologies, global mobility networks offer
roaming services for mobile users. Since in global mobility networks the communication …

Enhancing vehicular anonymity in ITS: A new scheme for mix zones and their placement

N Ravi, CM Krishna, I Koren - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
Intelligent transportation systems (ITS) achieve improved throughput and safety using
periodic vehicle-to-vehicle and vehicle-to-infrastructure wireless communication. Vehicles …