{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:49Z","timestamp":1750309369437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707724","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"1560-1569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"first","affiliation":[{"name":"University of Padova, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padova, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology (TU\/e), Eindhoven, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0029-1016","authenticated-orcid":false,"given":"Harshul","family":"Vaishnav","sequence":"additional","affiliation":[{"name":"University of Padova, Padova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"896","volume-title":"Rocking drones with intentional sound noise on gyroscopic sensors,\" in 24th {USENIX} Security Symposium ({USENIX} Security 15)","author":"Son Y.","year":"2015","unstructured":"Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, \"Rocking drones with intentional sound noise on gyroscopic sensors,\" in 24th {USENIX} Security Symposium ({USENIX} Security 15), 2015, pp. 881\u2013896."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22062384"},{"key":"e_1_3_2_1_3_1","article-title":"Authenticating drone-assisted internet of vehicles using elliptic curve cryptography and blockchain","author":"El-Zawawy M. A.","year":"2022","unstructured":"M. A. El-Zawawy, A. Brighente, and M. Conti, \"Authenticating drone-assisted internet of vehicles using elliptic curve cryptography and blockchain,\" IEEE Transactions on Network and Service Management, 2022.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108804"},{"key":"e_1_3_2_1_5_1","first-page":"863","volume-title":"IEEE","author":"Li H.","year":"2017","unstructured":"H. Li, G. Johnson, M. Jennings, and Y. Dong, \"Drone profiling through wireless fingerprinting,\" in 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017, pp. 858\u2013863."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.041"},{"volume-title":"Drone grounds flights,\" https:\/\/www.bbc.com\/news\/uk-england-sussex-46623754","year":"2019","key":"e_1_3_2_1_7_1","unstructured":"BBC, \"Gatwick Airport: Drone grounds flights,\" https:\/\/www.bbc.com\/news\/uk-england-sussex-46623754, 2019, accessed: 2024-Sep-11."},{"key":"e_1_3_2_1_8_1","unstructured":"Reuters \"Armed drone fired at Abha airport \" https:\/\/www.reuters.com\/world\/middle-east\/saudi-led-coalition-says-intercepts-armed-drone-fired-abhaairport-2021-05-10\/ 2021 accessed: 2024-Sep-11."},{"key":"e_1_3_2_1_9_1","first-page":"1451","volume-title":"IEEE","author":"Nassi B.","year":"2021","unstructured":"B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici, \"SoK: Security and privacy in the age of commercial drones,\" in IEEE Symposium on Security and Privacy. IEEE, 2021, pp. 1434\u20131451."},{"key":"e_1_3_2_1_10_1","unstructured":"FAA \"Remote identification of drones \" https:\/\/www.faa.gov\/uas\/getting_started\/remote_id 2021 accessed: 2024-Sep-11."},{"key":"e_1_3_2_1_11_1","unstructured":"US Court of Appeals \"Tyler Brennan v. Stephen Dickson No. 21-1087 (D.C. Cir. 2022) \" https:\/\/law.justia.com\/cases\/federal\/appellate-courts\/cadc\/21-1087\/21-1087-2022-07-29.html 2022 accessed: 2024-Sep-11."},{"key":"e_1_3_2_1_12_1","first-page":"11","volume-title":"Reliability and Security","author":"Brighente A.","year":"2022","unstructured":"A. Brighente, M. Conti, and S. Sciancalepore, \"Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing,\" in Proc. of International Conference on Availability, Reliability and Security, 2022, pp. 1\u201311."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485834"},{"key":"e_1_3_2_1_14_1","unstructured":"AIN \"RemoteID Drone Rule Raises Privacy Concerns \" https:\/\/www.ainonline.com\/aviation-news\/business-aviation\/2021-01-22\/nbaa-remote-id-drone-rule-raises-privacy-concerns 2021 accessed: 2024-Sep-11."},{"key":"e_1_3_2_1_15_1","first-page":"577","volume-title":"IEEE","author":"X.","year":"2018","unstructured":"Chang, X. et al., \"A surveillance system for drone localization and tracking using acoustic arrays,\" in IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM). IEEE, 2018, pp. 573\u2013577."},{"key":"e_1_3_2_1_16_1","first-page":"80","volume-title":"Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation,\" in Proceedings of the 12th International Conference on the Internet of Things","author":"Hussain A.","year":"2022","unstructured":"A. Hussain, N. Abughanam, S. Sciancalepore, E. Yaacoub, and A. Mohamed, \"Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation,\" in Proceedings of the 12th International Conference on the Internet of Things, 2022, pp. 73\u201380."},{"key":"e_1_3_2_1_17_1","first-page":"1249","volume-title":"IEEE","author":"Oh S.","year":"2011","unstructured":"S. Oh and M. Gruteser, \"Multi-node coordinated jamming for location privacy protection,\" in 2011-MILCOM 2011 Military Communications Conference. IEEE, 2011, pp. 1243\u20131249."},{"key":"e_1_3_2_1_18_1","first-page":"3061","article-title":"Phantom: Physical layer cooperation for location privacy protection","author":"Oh S.","year":"2012","unstructured":"S. Oh, T. Vu, M. Gruteser, and S. Banerjee, \"Phantom: Physical layer cooperation for location privacy protection,\" in Proc. IEEE INFOCOM. IEEE, 2012, pp. 3061\u20133065.","journal-title":"Proc. IEEE INFOCOM. IEEE"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3247871"},{"key":"e_1_3_2_1_20_1","article-title":"PPCA-Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles","author":"Tedeschi P.","year":"2022","unstructured":"P. Tedeschi, S. Sciancalepore, and R. Di Pietro, \"PPCA-Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles,\" IEEE Transactions on Dependable and Secure Computing, 2022.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"55","article-title":"Some remarks on the cantor pairing function","volume":"62","author":"Lisi M.","year":"2007","unstructured":"M. Lisi, \"Some remarks on the cantor pairing function,\" Le Matematiche, vol. 62, no. 1, pp. 55\u201365, 2007.","journal-title":"Le Matematiche"},{"key":"e_1_3_2_1_22_1","volume-title":"Boneh et al., \"Location Privacy via Private Proximity Testing,\" in NDSS","author":"Narayanan A.","year":"2011","unstructured":"A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, D. Boneh et al., \"Location Privacy via Private Proximity Testing,\" in NDSS, vol. 11, 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.988363"},{"key":"e_1_3_2_1_24_1","volume-title":"The elliptic curve diffie-hellman (ecdh),\" Online at https:\/\/koclab.cs.ucsb.edu\/teaching\/ecc\/project\/2015Projects\/Haakegaard+Lang.pdf","author":"Haakegaard R.","year":"2015","unstructured":"R. Haakegaard and J. Lang, \"The elliptic curve diffie-hellman (ecdh),\" Online at https:\/\/koclab.cs.ucsb.edu\/teaching\/ecc\/project\/2015Projects\/Haakegaard+Lang.pdf, 2015."},{"key":"e_1_3_2_1_25_1","first-page":"650","volume-title":"IEEE","author":"Hirschi L.","year":"2019","unstructured":"L. Hirschi and C. Cremers, \"Improving automated symbolic analysis of ballot secrecy for e-voting protocols: A method based on sufficient conditions,\" in 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2019, pp. 635\u2013650."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3240477"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589608.3593837"},{"key":"e_1_3_2_1_28_1","unstructured":"NATO \"Drone identification and tracking \" https:\/\/www.kaggle.com\/c\/icmcis-drone-tracking\/overview 2021 accessed: 2024-Sep-11)."},{"key":"e_1_3_2_1_29_1","first-page":"188","volume-title":"Analysis and Simulation of Wireless and Mobile Systems","author":"Svaigen A. R.","year":"2021","unstructured":"A. R. Svaigen, A. Boukerche, L. B. Ruiz, and A. A. Loureiro, \"Mixdrones: A mix zones-based location privacy protection mechanism for the internet of drones,\" in Proceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2021, pp. 181\u2013188."},{"key":"e_1_3_2_1_30_1","first-page":"6","volume-title":"IEEE","author":"Svaigen A. R.","year":"2022","unstructured":"A. R. Svaigen, \"A topological dummy-based location privacy protection mechanism for the internet of drones,\" in ICC 2022-IEEE International Conference on Communications. IEEE, 2022, pp. 1\u20136."},{"key":"e_1_3_2_1_31_1","first-page":"3532","volume-title":"An energy-aware location privacy protection mechanism for the internet of drones,\" in GLOBECOM 2022 - 2022 IEEE Global Communications Conference","author":"Svaigen A. R.","year":"2022","unstructured":"A. R. Svaigen, A. Boukerche, L. B. Ruiz, and A. A. F. Loureiro, \"Mixride: An energy-aware location privacy protection mechanism for the internet of drones,\" in GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022, pp. 3527\u20133532."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42045-020-00041-y"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.031"},{"key":"e_1_3_2_1_34_1","first-page":"213","volume-title":"IEEE","author":"Vaas C.","year":"2018","unstructured":"C. Vaas, M. Juuti, N. Asokan, and I. Martinovic, \"Get in line: Ongoing co-presence verification of a vehicle formation based on driving trajectories,\" in 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2018, pp. 199\u2013213."},{"key":"e_1_3_2_1_35_1","first-page":"187","volume-title":"SCN 2016, Amalfi, Italy, August 31\u2013September 2, 2016, Proceedings 10","author":"Hemenway B.","year":"2016","unstructured":"B. Hemenway, S. Lu, R. Ostrovsky, and W. Welser Iv, \"High-precision Secure Computation of Satellite Collision Probabilities,\" in Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31\u2013September 2, 2016, Proceedings 10. Springer, 2016, pp. 169\u2013187."},{"key":"e_1_3_2_1_36_1","first-page":"143","article-title":"Practical private set intersection protocols with linear complexity","author":"De Cristofaro E.","year":"2010","unstructured":"E. De Cristofaro and G. Tsudik, \"Practical private set intersection protocols with linear complexity,\" in Financial Cryptography and Data Security, 2010, pp. 143\u2013159.","journal-title":"Financial Cryptography and Data Security"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.07.017"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:14Z","timestamp":1750291574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":37,"alternative-id":["10.1145\/3672608.3707724","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707724","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}