hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Location privacy attacks and defenses in cloud-enabled internet of vehicles
Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
Guangdong University of Technology, Guangzhou, China & Guangdong Key Laboratory of IoT Information Technology, Guangzhou, China.
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).ORCID iD: 0000-0002-6526-3931
Show others and affiliations
2016 (English)In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 23, no 5, 52-59 p.Article in journal (Refereed) Published
Abstract [en]

As one of the promising branches of the Internet of Things, the cloud-enabled Internet of Vehicles (CE-IoV) is envisioned to serve as an essential data sensing, exchanging, and processing platform with powerful computing and storage capabilities for future intelligent transportation systems. The CE-IoV shows great promise for various emerging applications. In order to ensure uninterrupted and high-quality services, a vehicle should move with its own VM via live VM migration to obtain real-time location-based services. However, the live VM migration may lead to unprecedented location privacy challenges. In this article, we study location privacy issues and defenses in CE-IoV. We first present two kinds of unexplored VM mapping attacks, and thus design a VM identifier replacement scheme and a pseudonym-changing synchronization scheme to protect location privacy. We carry out simulations to evaluate the performance of the proposed schemes. Numerical results show that the proposed schemes are effective and efficient with high quality of privacy.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2016. Vol. 23, no 5, 52-59 p.
Keyword [en]
Internet of things, Cloud computing, Privacy, Intelligent vehicles, Real-time systems, Trajectory
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hh:diva-32611DOI: 10.1109/MWC.2016.7721742OAI: oai:DiVA.org:hh-32611DiVA: diva2:1052810
Note

Funding: In part by programs of NSFC under Grant nos. 61422201, 61370159, and U1201253, U1301255, the Science and Technology Program of Guangdong Province under Grant no. 2015B010129001 Special-Support Project of Guangdong Province under grant no. 2014TQ01X100 High Education Excellent Young Teacher Program of Guangdong Province under grant no. YQ2013057, Science and Technology Program of Guangzhou under grant no. 2014J2200097 (Zhujiang New Star Program), and is partially supported by the projects 240079/F20 funded by the Research Council of Norway, and the Polish Ministry of Science and Higher Education within the status activity task “Cognitive radio systems” in 2016.

Available from: 2016-12-07 Created: 2016-12-07 Last updated: 2016-12-08Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Jonsson, Magnus
By organisation
Centre for Research on Embedded Systems (CERES)
In the same journal
IEEE wireless communications
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 29 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf