Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks

I Memon, L Chen, QA Arain, H Memon… - International journal of …, 2018 - Wiley Online Library
In road network, vehicles' location may be identified, and their transmissions may even
tracked by eavesdrops (eg, safety messages) that contain sensitive personal information …

Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks

QA Arain, I Memon, Z Deng, MH Memon… - Multimedia Tools and …, 2018 - Springer
Nowadays communication by using mobile vehicle getting popularity and user experience
map services like Google maps to reach at the destination. It is also clear that map services …

[HTML][HTML] Optimized location-allocation of earthquake relief centers using PSO and ACO, complemented by GIS, clustering, and TOPSIS

B Saeidian, MS Mesgari, B Pradhan… - … international journal of …, 2018 - mdpi.com
After an earthquake, it is required to establish temporary relief centers in order to help the
victims. Selection of proper sites for these centers has a significant effect on the processes of …

MCFL: an energy efficient multi-clustering algorithm using fuzzy logic in wireless sensor network

M Mirzaie, SM Mazinani - Wireless Networks, 2018 - Springer
In this study, a multi-clustering algorithm based on fuzzy logic (MCFL) with an entirely
different approach is presented to carry out node clustering in wsn. This approach minimizes …

Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding

D Menaga, S Revathi - IET Information Security, 2018 - Wiley Online Library
Privacy preserving data mining (PPDM) is a well‐known research area, which can analyse
the database ensuring privacy such that it does not expose the confidential details. This …

Distance and clustering‐based energy‐efficient pseudonyms changing strategy over road network

I Memon - International Journal of Communication Systems, 2018 - Wiley Online Library
To improve the fairness, the energy consumption changing pseudonyms needs to be taken
into account. Existing works focus on changing velocity‐based pseudonyms changing …

Energy-efficient sink placement in wireless sensor networks

G Tsoumanis, K Oikonomou, G Koufoudakis, S Aïssa - Computer Networks, 2018 - Elsevier
Prolonging a wireless sensor network's lifetime is closely related to energy consumption and
particularly the energy hole problem, where sensor nodes close to the sink consume a …

MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy

I Memon, HT Mirza - International Journal of Communication …, 2018 - Wiley Online Library
In intelligent transportation systems, the messages transmitted and received from one
vehicle to another vehicle may enhance location privacy scheme; falsification message …

Secure and compact implementation of optimized Montgomery multiplier based elliptic curve cryptography on FPGA with road vehicular traffic collecting protocol for …

S Baskar, VRS Dhulipala - International Journal of Heavy …, 2018 - inderscienceonline.com
Nowadays, vehicular communication plays a crucial role in vehicular adhoc networks
(VANET) because it helps to gather several details such as traffic, accident, vehicle …

Multi‐objective auto‐regressive whale optimisation for traffic‐aware routing in urban VANET

D Rewadkar, D Doye - IET Information Security, 2018 - Wiley Online Library
Vehicular ad‐hoc network (VANET) is a growing networking concept that has been used
increasingly in various applications including traffic alert broadcasting. The main purpose of …