Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download BibTeX

Title

Location Privacy Attacks and Defenses in Cloud-Enabled Internet of Vehicles

Authors

[ 1 ] Wydział Elektroniki i Telekomunikacji, Politechnika Poznańska | [ P ] employee

Year of publication

2016

Published in

IEEE Wireless Communications

Journal year: 2016 | Journal volume: vol. 23 | Journal number: iss. 5

Article type

scientific article

Publication language

english

Abstract

EN As one of the promising branches of the Internet of Things, the cloud-enabled Internet of Vehicles (CE-IoV) is envisioned to serve as an essential data sensing, exchanging, and processing platform with powerful computing and storage capabilities for future intelligent transportation systems. The CE-IoV shows great promise for various emerging applications. In order to ensure uninterrupted and high-quality services, a vehicle should move with its own VM via live VM migration to obtain real-time location-based services. However, the live VM migration may lead to unprecedented location privacy challenges. In this article, we study location privacy issues and defenses in CE-IoV. We first present two kinds of unexplored VM mapping attacks, and thus design a VM identifier replacement scheme and a pseudonym-changing synchronization scheme to protect location privacy. We carry out simulations to evaluate the performance of the proposed schemes. Numerical results show that the proposed schemes are effective and efficient with high quality of privacy.

Pages (from - to)

52 - 59

DOI

10.1109/MWC.2016.7721742

URL

https://ieeexplore.ieee.org/document/7721742

Ministry points / journal

50

Impact Factor

8,972

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.