{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:29:17Z","timestamp":1725542957613},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642115257"},{"type":"electronic","value":"9783642115264"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11526-4_4","type":"book-chapter","created":{"date-parts":[[2010,1,6]],"date-time":"2010-01-06T04:20:01Z","timestamp":1262751601000},"page":"39-51","source":"Crossref","is-referenced-by-count":2,"title":["RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks"],"prefix":"10.1007","author":[{"given":"Yu-Chih","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yi-Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hwai-Ling","family":"Shan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"1229","volume-title":"INFOCOM 2008. The 27th Conference on Computer Communications","author":"R. Lu","year":"2008","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P., Shen, X.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: INFOCOM 2008. The 27th Conference on Computer Communications, pp. 1229\u20131237. IEEE, Los Alamitos (2008)"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security\u00a015, 39\u201368 (2007)","journal-title":"Journal of Computer Security"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"D\u00f6tzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. Privacy Enhancing Technologies, pp. 197\u2013209 (2006)","DOI":"10.1007\/11767831_13"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms-Ideal and Real. In: IEEE 65th Vehicular Technology Conference, 2007. VTC 2007, pp. 2521\u20132525 (Spring 2007)","DOI":"10.1109\/VETECS.2007.519"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Hubaux, J., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp. 19\u201328 (2007)","DOI":"10.1145\/1287748.1287752"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11767831_5","volume-title":"Privacy Enhancing Technologies","author":"L. Huang","year":"2006","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 59\u201377. Springer, Heidelberg (2006)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K. Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M.Y., Huang, L.P., Poovendran, R.: AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications\u00a025, 1569\u20131589 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Shin, H., Atluri, V., Vaidya, J.: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. In: 9th International Conference on Mobile Data Management, 2008. MDM 2008, pp. 73\u201380 (2008)","DOI":"10.1109\/MDM.2008.33"},{"key":"4_CR10","unstructured":"Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. Georgia Institute of Technology (2004)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 161\u2013171 (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"4_CR12","volume-title":"Proceedings of the 10th workshop on Mobile Computing Systems and Applications","author":"J.T. Meyerowitz","year":"2009","unstructured":"Meyerowitz, J.T., Choudhury, R.R.: Realtime location privacy via mobility prediction: creating confusion at crossroads. In: Proceedings of the 10th workshop on Mobile Computing Systems and Applications. ACM, Santa Cruz (2009)"},{"key":"4_CR13","unstructured":"Beresford, A., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proceedings of First IEEE International Workshop on Pervasive Computing and Communication Security, PerSec (2004)"},{"key":"4_CR14","unstructured":"Freudiger, J., Raya, M., F\u00e9legyh\u00e1zi, M., Papadimitratos, P., Hubaux, J.P.: Mix-Zones for Location Privacy in Vehicular Networks (2007)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Chow, C., Mokbel, M., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pp. 171\u2013178 (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology\u00a056, 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4_CR17","unstructured":"Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: 4th Workshop on Mobile Ad-Hoc Networks (WMAN) (March 2007)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K., Japan, N.R.C., Tokyo, J.: Enhancing wireless location privacy using silent period. In: 2005 IEEE Conference on Wireless Communications and Networking, vol.\u00a02 (2005)","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/sec.31","volume":"1","author":"L. Tang","year":"2008","unstructured":"Tang, L., Hong, X., Bradford, P.G.: Privacy-preserving secure relative localization in vehicular networks. Security and Communication Networks\u00a01, 195\u2013204 (2008)","journal-title":"Security and Communication Networks"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 19\u201328 (2006)","DOI":"10.1145\/1179601.1179605"},{"key":"4_CR21","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. In: Proceedings of Embedded Security in Cars, ESCAR (2005)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Choi, W., Nam, J., Choi, S.: Hop State Prediction Method Using Distance Differential of RSSI on VANET, vol.\u00a01 (2008)","DOI":"10.1109\/NCM.2008.252"},{"key":"4_CR23","first-page":"12","volume":"9","author":"M. Bouassida","year":"2009","unstructured":"Bouassida, M., Guette, G., Shawky, M., Ducourthial, B.: Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. International Journal of Network Security\u00a09, 12 (2009)","journal-title":"International Journal of Network Security"},{"key":"4_CR24","volume-title":"Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks","author":"X. Bin","year":"2006","unstructured":"Bin, X., Bo, Y., Chuanshan, G.: Detection and localization of sybil nodes in VANETs. In: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. ACM, Los Angeles (2006)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Lau, E.E.L., Chung, W.Y.: Enhanced RSSI-Based Real-Time User Location Tracking System for Indoor and Outdoor Environments, pp. 1213\u20131218 (2007)","DOI":"10.1109\/ICCIT.2007.4420422"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Choi, W.S., Nam, J.W., Choi, S.G.: Hop State Prediction Method Using Distance Differential of RSSI on VANET, vol.\u00a01 (2008)","DOI":"10.1109\/NCM.2008.252"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Saxena, M., Gupta, P., Jain, B.N.: Experimental analysis of RSSI-based location estimation in wireless sensor networks, pp. 503\u2013510 (2008)","DOI":"10.1109\/COMSWA.2008.4554465"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Whitehouse, K., Karlof, C., Culler, D.: A practical evaluation of radio signal strength for ranging-based localization (2007)","DOI":"10.1145\/1234822.1234829"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1017\/S0373463304002905","volume":"57","author":"G.R. Jagadeesh","year":"2004","unstructured":"Jagadeesh, G.R., Srikanthan, T., Zhang, X.D.: A Map Matching Method for GPS Based Real-Time Vehicle Location. Journal of Navigation\u00a057, 429\u2013440 (2004)","journal-title":"Journal of Navigation"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"4_CR31","unstructured":"SUMO: Simulation of Urban Mobility, http:\/\/sumo.sourceforge.net\/"},{"key":"4_CR32","unstructured":"Trans: Traffic and Network Simulation Environment, http:\/\/trans.epfl.ch\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security in Emerging Wireless Communication and Networking Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11526-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T23:21:05Z","timestamp":1558740065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11526-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642115257","9783642115264"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11526-4_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}