Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Location Privacy

Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice
no node can get to know any information about the location (either in terms of physical distance or number of hops) of the sender node except the source, its immediate neighbors and the destination.
Published in Chapter:
Privacy and Trust Management Schemes of Wireless Sensor Networks: A Survey
Riaz Ahmed Shaikh (Kyung Hee University, Korea), Brian J. dAuriol (Kyung Hee University, Korea), Heejo Lee (Korea University, Korea), and Sungyoung Lee (Kyung Hee University, Korea)
DOI: 10.4018/978-1-61520-701-5.ch013
Abstract
Until recently, researchers have focused on the cryptographic-based security issues more intensively than the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solution. In this chapter, we present generic and flexible taxonomies of privacy and trust. We also give detailed critical analyses of the state-of-the-art research, in the field of privacy and trust that is currently not available in the literature. This chapter also highlights the challenging issues and problems.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Intelligent and Secure Framework for Wireless Information Technology in Healthcare for User and Data Classification in Hospitals
Location privacy is an important security issue. Lack of location privacy can lead to subsequent exposure of significant traffic information on the network and the physical world entities. For instance, cardiologic data packet coming out of a hospital in a mesh network enable an eavesdropper to analyze and find out at-risk heart patients, if the source location of those packets can be determined. Toward that goal, a number of source-location communication protocols have been proposed (Deng & Mishra, 2004 AU65: The in-text citation "Deng & Mishra, 2004" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ; Shao, Yang, Zhu, & Cao, 2008 ), where the main idea is a mixture of valid and fake messages. Each node transmits either a valid or a fake message, consistently. The main disadvantage of this approach is that the broadcasting of fake messages consumes significant amount of the limited energy in each sensor node. Moreover, because each node has to transmit a packet in every time slot, the effect is increase in number of collisions, and decrease in the packet delivery ratio. Therefore, these approaches are not suitable especially for large scale wireless sensor networks.
Full Text Chapter Download: US $37.50 Add to Cart
Location Privacy
The claim of individuals to determine for themselves when, how, and to what extent information about their geographic location is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Location Privacy in Automotive Telematics
Location privacy is the ability of an individual to control access to his/her current and past location information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR