{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T05:34:57Z","timestamp":1762320897270,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"KAU Endowment (WAQF) at King Abdulaziz University, Jeddah","award":["218-830-2024"],"award-info":[{"award-number":["218-830-2024"]}]},{"name":"Deanship of Scientific Research"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGI"],"abstract":"<jats:p>Location-based services (LBSs) are a crucial element of the Internet of Things (IoT) and have garnered significant attention from both researchers and users, driven by the rise of wireless devices and a growing user base. However, the use of LBS-enabled applications carries several risks, as users must provide their real locations with each query. This can expose them to potential attacks from the LBS server, leading to serious issues like the theft of personal information. Consequently, protecting location privacy is a vital concern. To address this, location dummy-based methods are employed to safeguard the location privacy of LBS users. However, location dummy-based approaches also suffer from problems such as low resistance against inference attacks and the generation of strong dummy locations, an issue that is considered an open problem. Moreover, generating many location dummies to achieve a high privacy protection level leads to high network overhead and requires high computational capabilities on the mobile devices of the LBS users, and such devices are limited. In this paper, we introduce the Caching-Aware Double-Dummy Selection (CaDDSL) algorithm to protect the location privacy of LBS users against homogeneity location and semantic location inference attacks, which may be applied by the LBS server as a malicious party. Then, we enhance the CaDDSL algorithm via encapsulation with agents to solve the tradeoff between generating many dummies and large network overhead by proposing the Cache-Aware Overhead-Aware Dummy Selection (CaOaDSL) algorithm. Compared to three well-known approaches, namely GridDummy, CirDummy, and Dest-Ex, our approach showed better performance in terms of communication cost, cache hit ratio, resistance against inference attacks, and network overhead.<\/jats:p>","DOI":"10.3390\/ijgi14110433","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T17:32:01Z","timestamp":1762191121000},"page":"433","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Agent-Based System for Location Privacy Protection in Location-Based Services"],"prefix":"10.3390","volume":"14","author":[{"given":"Omar F.","family":"Aloufi","sequence":"first","affiliation":[{"name":"Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"},{"name":"Department of Information Systems, College of Computer Science and Engineering, Taibah University, Madinah 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1772-2782","authenticated-orcid":false,"given":"Ahmed S.","family":"Alfakeeh","sequence":"additional","affiliation":[{"name":"Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9885-1775","authenticated-orcid":false,"given":"Fahad M.","family":"Alotaibi","sequence":"additional","affiliation":[{"name":"Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"129415","DOI":"10.1109\/ACCESS.2020.3009200","article-title":"A double obfuscation approach for protecting the privacy of IoT location based applications","volume":"8","author":"Albouq","year":"2020","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Giovanni, P., Pilloni, V., and Martal\u00f2, M. (2024). Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation. Sensors, 24.","key":"ref_2","DOI":"10.3390\/s24072214"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3142","DOI":"10.3390\/s23063142","article-title":"Location privacy-preserving scheme in iobt networks using deception-based techniques","volume":"23","author":"Basmh","year":"2023","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.3390\/smartcities6040096","article-title":"Pseudolites to support location services in smart cities: Review and prospects","volume":"6","author":"Liu","year":"2023","journal-title":"Smart Cities"},{"doi-asserted-by":"crossref","unstructured":"Qi, L., Liu, Y., Yu, Y., Chen, L., and Chen, R. (2024). Current Status and Future Trends of Meter-Level Indoor Positioning Technology: A Review. Remote Sens., 16.","key":"ref_5","DOI":"10.3390\/rs16020398"},{"doi-asserted-by":"crossref","unstructured":"Jo, H.G., Son, T.Y., Jeong, S.Y., and Kang, S.J. (2016). Proximity-based asynchronous messaging platform for location-based Internet of Things service. ISPRS Int. J. Geo Inf., 5.","key":"ref_6","DOI":"10.3390\/ijgi5070116"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.comnet.2015.11.024","article-title":"Green data center with IoT sensing and cloud-assisted smart temperature control system","volume":"101","author":"Liu","year":"2016","journal-title":"Comput. Netw."},{"unstructured":"Hidetoshi, K., Yanagisawa, Y., and Satoh, T. (2005, January 11\u201314). An anonymous communication technique using dummies for location-based services. Proceedings of the ICPS\u201905 International Conference on Pervasive Services, Santorini, Greece.","key":"ref_8"},{"doi-asserted-by":"crossref","unstructured":"Lu, H., Jensen, C.S., and Yiu, M.L. (2008, January 13). Pad: Privacy-area aware, dummy-based location privacy in mobile services. Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, BC, Canada.","key":"ref_9","DOI":"10.1145\/1626536.1626540"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/ACCESS.2016.2526060","article-title":"Dummy-Based User Location Anonymization Under Real-World Constraints","volume":"4","author":"Hara","year":"2016","journal-title":"IEEE Access"},{"key":"ref_11","first-page":"7251395","article-title":"Location Privacy Protection Based on Improved-Value Method in Augmented Reality on Mobile Devices","volume":"2017","author":"Yin","year":"2017","journal-title":"Mob. Inf. Syst."},{"key":"ref_12","first-page":"7164126","article-title":"LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme","volume":"2016","author":"Chen","year":"2016","journal-title":"Mob. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zhang, S., Li, M., Liang, W., Sandor, V.K.A., and Li, X. (2022). A survey of dummy-based location privacy protection techniques for location-based services. Sensors, 22.","key":"ref_13","DOI":"10.3390\/s22166141"},{"doi-asserted-by":"crossref","unstructured":"Alrahhal, H., Alrahhal, M.S., Jamous, R., and Jambi, K. (2020). A symbiotic relationship based leader approach for privacy protection in location based services. ISPRS Int. J. Geo Inf., 9.","key":"ref_14","DOI":"10.3390\/ijgi9060408"},{"key":"ref_15","first-page":"52","article-title":"Agent-based system for efficient kNN Query processing with comprehensive privacy protection","volume":"9","author":"Shady","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_16","first-page":"6719","article-title":"A survey on privacy of location-based services: Classification, inference attacks, and challenges","volume":"95","author":"Alrahhal","year":"2017","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1007\/s11277-024-10977-9","article-title":"Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research Directions","volume":"134","author":"Gupta","year":"2024","journal-title":"Wirel. Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Horvath, K., and Kimovski, D. (2025). Efficient Location-Based Service Discovery for IoT and Edge Computing in the 6G Era. arXiv.","key":"ref_18","DOI":"10.1109\/ICINT65528.2025.11030893"},{"doi-asserted-by":"crossref","unstructured":"Wang, B., Li, H., Ren, X., and Guo, Y. (2023). An efficient differential privacy-based method for location privacy protection in location-based services. Sensors, 23.","key":"ref_19","DOI":"10.3390\/s23115219"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"103253","DOI":"10.1016\/j.adhoc.2023.103253","article-title":"A novel approach of privacy protection of mobile users while using location-based services applications","volume":"149","author":"Saravanan","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"45998","DOI":"10.1109\/ACCESS.2025.3547747","article-title":"Location and Intent Privacy Preservation for Spatial Range Queries in a Mobile Network","volume":"13","author":"Siddiqie","year":"2025","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Sun, S., Qian, Y., Zhang, R., Wang, Y., and Li, X. (2021). An improved chinese string comparator for Bloom filter based privacy-preserving record linkage. Entropy, 23.","key":"ref_22","DOI":"10.3390\/e23081091"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"129320","DOI":"10.1109\/ACCESS.2020.3009245","article-title":"Dummy-based approach for protecting mobile agents against malicious destination machines","volume":"8","author":"Alluhaybi","year":"2020","journal-title":"IEEE Access"}],"container-title":["ISPRS International Journal of Geo-Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2220-9964\/14\/11\/433\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T05:18:29Z","timestamp":1762319909000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2220-9964\/14\/11\/433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":23,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["ijgi14110433"],"URL":"https:\/\/doi.org\/10.3390\/ijgi14110433","relation":{},"ISSN":["2220-9964"],"issn-type":[{"type":"electronic","value":"2220-9964"}],"subject":[],"published":{"date-parts":[[2025,11,3]]}}}