Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment, and attacks, IoBT networks differ significantl...
| Published in: | Sensors |
|---|---|
| Main Authors: | Basmh Alkanjr, Imad Mahgoub |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-03-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/1424-8220/23/6/3142 |
Similar Items
A Novel Deception-Based Scheme to Secure the Location Information for IoBT Entities
by: Basmh Alkanjr, et al.
Published: (2023-01-01)
by: Basmh Alkanjr, et al.
Published: (2023-01-01)
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of- Battlefield Things (IoBT) Deployments
by: Ismail Butun, et al.
Published: (2024-01-01)
by: Ismail Butun, et al.
Published: (2024-01-01)
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
by: Shiwen Zhang, et al.
Published: (2022-08-01)
by: Shiwen Zhang, et al.
Published: (2022-08-01)
Trajectory privacy protection method based on location obfuscation
by: Shaobo ZHANG, et al.
Published: (2018-07-01)
by: Shaobo ZHANG, et al.
Published: (2018-07-01)
Trajectory privacy protection method based on location obfuscation
by: Shaobo ZHANG, et al.
Published: (2018-07-01)
by: Shaobo ZHANG, et al.
Published: (2018-07-01)
A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles
by: Xianyun Xu, et al.
Published: (2021-05-01)
by: Xianyun Xu, et al.
Published: (2021-05-01)
Double Dummy Location Selection Algorithm Based on Behavior Correlation
by: TU Sipan, ZHANG Lin, LIU Xiping
Published: (2023-05-01)
by: TU Sipan, ZHANG Lin, LIU Xiping
Published: (2023-05-01)
Non-cooperative inference method for the IoBT topology based on flow rate estimation
by: Jun Huang, et al.
Published: (2025-04-01)
by: Jun Huang, et al.
Published: (2025-04-01)
A Voronoi-Based Semantically Balanced Dummy Generation Framework for Location Privacy
by: Aditya Tadakaluru, et al.
Published: (2023-03-01)
by: Aditya Tadakaluru, et al.
Published: (2023-03-01)
Dummy location selection algorithm based on location semantics and query probability
by: Jie WANG, et al.
Published: (2020-03-01)
by: Jie WANG, et al.
Published: (2020-03-01)
Dummy location selection algorithm based on location semantics and query probability
by: Jie WANG, et al.
Published: (2020-03-01)
by: Jie WANG, et al.
Published: (2020-03-01)
Privacy-preserving location-based traffic density monitoring
by: Lei Wu, et al.
Published: (2022-12-01)
by: Lei Wu, et al.
Published: (2022-12-01)
A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles
by: Qianyong Huang, et al.
Published: (2022-06-01)
by: Qianyong Huang, et al.
Published: (2022-06-01)
Mobile Fog AI for Internet of BattleField Things (IoBT)
by: Sheuli Paul, et al.
Published: (2024-05-01)
by: Sheuli Paul, et al.
Published: (2024-05-01)
Dummy Location Generation Algorithm for User Density
by: LI Menghan, et al.
Published: (2024-12-01)
by: LI Menghan, et al.
Published: (2024-12-01)
Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
by: Hai LIU, et al.
Published: (2016-07-01)
by: Hai LIU, et al.
Published: (2016-07-01)
Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
by: Hai LIU, et al.
Published: (2016-07-01)
by: Hai LIU, et al.
Published: (2016-07-01)
PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs
by: Xinyang Deng, et al.
Published: (2022-05-01)
by: Xinyang Deng, et al.
Published: (2022-05-01)
TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET
by: Yunheng Wu
Published: (2025-01-01)
by: Yunheng Wu
Published: (2025-01-01)
A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas
by: Ahsan Hayat, et al.
Published: (2023-01-01)
by: Ahsan Hayat, et al.
Published: (2023-01-01)
Cooperation and radio silence strategy in Mix Zone to Protect Location Privacy of Vehicle in VANET
by: Izdihar S. Shaleesh, et al.
Published: (2021-05-01)
by: Izdihar S. Shaleesh, et al.
Published: (2021-05-01)
The K-Anonymous Dummy Location Selection Algorithm Based on Historical Query Probability
by: YANG Yang, HU Xiaohui, DU Yongwen
Published: (2022-02-01)
by: YANG Yang, HU Xiaohui, DU Yongwen
Published: (2022-02-01)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
by: Messaoud Babaghayou, et al.
Published: (2023-01-01)
by: Messaoud Babaghayou, et al.
Published: (2023-01-01)
Multi-factor Dummy Location Selection Algorithm in Location-based Service
by: LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
Published: (2025-05-01)
by: LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
Published: (2025-05-01)
SGO: Semantic Group Obfuscation for Location-Based Services in VANETS
by: Ikram Ullah, et al.
Published: (2024-02-01)
by: Ikram Ullah, et al.
Published: (2024-02-01)
A Symbiotic Relationship Based Leader Approach for Privacy Protection in Location Based Services
by: Hosam Alrahhal, et al.
Published: (2020-06-01)
by: Hosam Alrahhal, et al.
Published: (2020-06-01)
Location of Patient Laid Down on Gatch Bed in order to Decrease Pressures around Abdominal Regions While Backrest Lifting
by: Hiroko KOBAYASHI, et al.
Published: (2012-04-01)
by: Hiroko KOBAYASHI, et al.
Published: (2012-04-01)
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs
by: Ikram Ullah, et al.
Published: (2021-04-01)
by: Ikram Ullah, et al.
Published: (2021-04-01)
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles
by: Messaoud Babaghayou, et al.
Published: (2021-04-01)
by: Messaoud Babaghayou, et al.
Published: (2021-04-01)
A location semantic privacy protection model based on spatial influence
by: Linghong Kuang, et al.
Published: (2025-04-01)
by: Linghong Kuang, et al.
Published: (2025-04-01)
Privacy Preservation Using 2-Degree Anonymity With Trust Circle in Ubiquitous Network for Service Communications
by: Swarnali Hazra, et al.
Published: (2020-01-01)
by: Swarnali Hazra, et al.
Published: (2020-01-01)
The Problems and Design of a Neck Dummy
by: Christopher René Torres San Miguel, et al.
Published: (2024-10-01)
by: Christopher René Torres San Miguel, et al.
Published: (2024-10-01)
LP-BT: A location privacy protection algorithm based on ball trees
by: Lechan Yang, et al.
Published: (2023-01-01)
by: Lechan Yang, et al.
Published: (2023-01-01)
Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity
by: Xiao Zhang, et al.
Published: (2023-03-01)
by: Xiao Zhang, et al.
Published: (2023-03-01)
Machine Learning-Driven Security and Privacy Analysis of a Dummy-ABAC Model for Cloud Computing
by: Baby Marina, et al.
Published: (2025-10-01)
by: Baby Marina, et al.
Published: (2025-10-01)
Security and Privacy for Mobile IoT Applications Using Blockchain
by: Kevin Carvalho, et al.
Published: (2021-09-01)
by: Kevin Carvalho, et al.
Published: (2021-09-01)
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
by: Kai-yue LEI, et al.
Published: (2016-12-01)
by: Kai-yue LEI, et al.
Published: (2016-12-01)
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
by: Kai-yue LEI, et al.
Published: (2016-12-01)
by: Kai-yue LEI, et al.
Published: (2016-12-01)
Research progress on location privacy-preserving techniques
by: Sheng WAN, et al.
Published: (2016-12-01)
by: Sheng WAN, et al.
Published: (2016-12-01)
Research progress on location privacy-preserving techniques
by: Sheng WAN, et al.
Published: (2016-12-01)
by: Sheng WAN, et al.
Published: (2016-12-01)
Similar Items
-
A Novel Deception-Based Scheme to Secure the Location Information for IoBT Entities
by: Basmh Alkanjr, et al.
Published: (2023-01-01) -
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of- Battlefield Things (IoBT) Deployments
by: Ismail Butun, et al.
Published: (2024-01-01) -
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
by: Shiwen Zhang, et al.
Published: (2022-08-01) -
Trajectory privacy protection method based on location obfuscation
by: Shaobo ZHANG, et al.
Published: (2018-07-01) -
Trajectory privacy protection method based on location obfuscation
by: Shaobo ZHANG, et al.
Published: (2018-07-01)
