{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:54:03Z","timestamp":1774644843516,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSFC project;Technology project of Gansu Province","award":["no.61762058 and no.61861024;no.1610RJZA056"],"award-info":[{"award-number":["no.61762058 and no.61861024;no.1610RJZA056"]}]},{"name":"the youth Science Foundation of Lanzhou Jiaotong University , and Foundation of A Hundred Youth Talents Training Program of Lanzhou Jiaotong University.","award":["no.2014026"],"award-info":[{"award-number":["no.2014026"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT). Although LBS provide enormous benefits to users, they inevitably introduce some significant privacy concerns. To protect user privacy, a variety of location privacy-preserving schemes have been recently proposed. Among these schemes, the dummy-based location privacy-preserving (DLP) scheme is a widely used approach to achieve location privacy for mobile users. However, the computation cost of the existing dummy-based location privacy-preserving schemes is too high to meet the practical requirements of resource-constrained IoT devices. Moreover, the DLP scheme is inadequate to resist against an adversary with side information. Thus, how to effectively select a dummy location is still a challenge. In this paper, we propose a novel lightweight dummy-based location privacy-preserving scheme, named the enhanced dummy-based location privacy-preserving(Enhanced-DLP) to address this challenge by considering both computational costs and side information. Specifically, the Enhanced-DLP adopts an improved greedy scheme to efficiently select dummy locations to form a k-anonymous set. A thorough security analysis demonstrated that our proposed Enhanced-DLP can protect user privacy against attacks. We performed a series of experiments to verify the effectiveness of our Enhanced-DLP. Compared with the existing scheme, the Enhanced-DLP can obtain lower computational costs for the selection of a dummy location and it can resist side information attacks. The experimental results illustrate that the Enhanced-DLP scheme can effectively be applied to protect the user\u2019s location privacy in IoT applications and services.<\/jats:p>","DOI":"10.3390\/info10090278","type":"journal-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T02:59:22Z","timestamp":1567738762000},"page":"278","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1808-8904","authenticated-orcid":false,"given":"Yongwen","family":"Du","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730000, China"}]},{"given":"Gang","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0350-359X","authenticated-orcid":false,"given":"Xuejun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730000, China"}]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730000, China"}]},{"given":"Jinghua","family":"Jiang","sequence":"additional","affiliation":[{"name":"Baidu Inc.Baidu Building, 10 Shangdi 10th Street, Haidian District, Beijing 100000, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"key":"ref_1","unstructured":"Statista Inc. (2019, August 30). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_2","unstructured":"Ironpaper, Growth Agency (2019, August 30). Internet of Things Market Statistics-2016. Available online: https:\/\/www.ironpaper.com."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"8956","DOI":"10.1109\/ACCESS.2017.2695525","article-title":"Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey","volume":"5","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"ref_4","first-page":"2373","article-title":"Privacy preservation for location-based services: A survey","volume":"26","author":"Zhang","year":"2015","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"key":"ref_5","unstructured":"Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., and Li, H. (2013, January 9\u201313). MobiCache: When k-anonymity meets cache. Proceedings of the 2013 IEEE Global Communication and Information System Security Symposium (GLOBECOM), Atlanta, GA, USA."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1016\/j.ins.2019.01.008","article-title":"Towards privacy preservation for \u201ccheck-in\u201d services in location-based social networks","volume":"481","author":"Sun","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, K., Guo, L., Li, X., and Fang, Y. (2013, January 14\u201319). A game-theoretic approach for achieving k-anonymity in Location Based Services. Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy.","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., and Li, H. (May, January 27). Achieving k-anonymity in privacy-aware location-based services. Proceedings of the IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jnca.2016.10.011","article-title":"Efficient location privacy algorithm for Internet of Things (IoT) services and applications","volume":"89","author":"Sun","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TNET.2012.2208983","article-title":"Privacy Vulnerability of Published Anonymous Mobility Traces","volume":"21","author":"Ma","year":"2013","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Serjantov, A., and Danezis, G. (2002). Towards an information theoretic metric for anonymity. Privacy Enhancing Technologies, Springer.","DOI":"10.1007\/3-540-36467-6_4"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Pingley, A., Zhang, N., Fu, X., Choi, H., Subramaniam, S., and Zhao, W. (2011, January 10\u201315). Protection of query privacy for continuous location-based services. Proceedings of the 2011 IEEE INFOCOM, Shanghai, China.","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"9173519","DOI":"10.1155\/2018\/9173519","article-title":"A Context-Aware Location Differential Perturbation Scheme for Privacy-Aware Users in Mobile Environment","volume":"2018","author":"Zhang","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lu, H., Jensen, C., and Yiu, M. (2008, January 13). PAD: Privacy-area aware, dummy based location privacy in mobile services. Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, BC, Canada.","DOI":"10.1145\/1626536.1626540"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.future.2015.09.016","article-title":"A comprehensive approach to privacy in the cloud-based Internet of Things","volume":"56","author":"Henze","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Appavoo, P., Chan, M.C., Bhojan, A., and Chang, E.C. (2016, January 5\u201310). Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. Proceedings of the IEEE International Conference on Communication Systems and Networks, Bangalore, India.","DOI":"10.1109\/COMSNETS.2016.7439941"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","article-title":"An Information Framework for Creating a Smart City Through Internet of Things","volume":"1","author":"Jin","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/JIOT.2014.2306673","article-title":"CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service","volume":"1","author":"Lai","year":"2014","journal-title":"IEEE Internet of Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/LWC.2015.2408609","article-title":"Security and privacy in the internet-of-things under time-and-budget-limited adversary mode","volume":"4","author":"Premnath","year":"2015","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wu, Q., Liu, H., Zhang, C., Fan, Q., Li, Z., and Wang, K. (2019). Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT. Electronics, 8.","DOI":"10.3390\/electronics8020148"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","article-title":"Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things","volume":"14","author":"Yin","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"5787930","DOI":"10.1155\/2018\/5787930","article-title":"Privacy Protection of IoT Based on Fully Homomorphic Encryption","volume":"2018","author":"Song","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_23","unstructured":"Sfar, A.R., Challal, Y., Moyal, P., and Natalizio, E. (2019). A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. IEEE Trans. Intell. Transp. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1016\/j.future.2019.02.049","article-title":"A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things","volume":"96","author":"He","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.jnca.2019.06.017","article-title":"Access control in Internet-of-Things: A survey","volume":"144","author":"Ravidas","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3324","DOI":"10.1002\/sec.1537","article-title":"Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness","volume":"9","author":"Venckauskas","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s00607-018-0639-0","article-title":"Multi-access edge computing aided mobility for privacy protection in internet of things","volume":"101","author":"Zhang","year":"2019","journal-title":"Computing"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms","volume":"7","author":"Gedik","year":"2008","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ying, B., and Makrakis, D. (May, January 27). Protecting Location Privacy with Clustering Anonymization in vehicular networks. Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada.","DOI":"10.1109\/INFCOMW.2014.6849249"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Hossain, A., Jang, S., and Chang, J. (2012, January 24\u201329). Privacy-aware cloaking technique in location-based services. Proceedings of the IEEE First International Conference on MobileServices, Honolulu, HI, USA.","DOI":"10.1109\/MobServ.2012.23"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1016\/j.future.2017.06.022","article-title":"Enhancing privacy through uniform grid and caching in location-based services","volume":"86","author":"Zhang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_32","first-page":"3682382","article-title":"Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus","volume":"2018","author":"Sun","year":"2018","journal-title":"Mob. Inf. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"50031","DOI":"10.1109\/ACCESS.2019.2911107","article-title":"Enabling Smart Anonymity Scheme for Security Collaborative Enhancement in Location-Based Services","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4191","DOI":"10.1109\/JIOT.2018.2842470","article-title":"A Dual Privacy Preserving Scheme in Continuous Location-Based Services","volume":"5","author":"Zhang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_35","unstructured":"Shaham, S., Ding, M., Liu, B., Lin, Z., and Li, J. (2018). Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model. arXiv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/9\/278\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:17:03Z","timestamp":1760188623000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/9\/278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"references-count":35,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["info10090278"],"URL":"https:\/\/doi.org\/10.3390\/info10090278","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,5]]}}}