Identifying the Node Presence Mobile Wireless Networks to Provide Location Based Services
-
2018-04-25 https://doi.org/10.14419/ijet.v7i2.24.12086 -
. -
Abstract
Based on spatial and fleeting enormous information, location-based services (LBSs) get significant consideration because of their capability to make urban areas more brilliant. In any case, LBS gives the usefulness by extricating individual information from clients, which may bring about security spillage chance, for example, interruption, robbery, and unapproved offer of touchy data. Consequently, the mass piece of the pie of LBS relies upon the security of subjects ensured. Particularly contemplate the security threats in LBSs. Characterizing distinctive sorts of LBSs and investigating security spillage introduced every kind. In the wake of outlining the best in class chip away at location protection and question security, we propose an inquiry content safeguarding method with the point of furnishing precise LBS reply with null server learning on questions. At long last, we demonstrate some open issues that may develop future research on LBS insurance preservation.
-
References
[1] W. Enck et al., “Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,†ACM Trans. Computer Systems, vol. 32, no. 2, 2014, pp. 5:1–29.
[2] M. Singhal, A. Shukla, Implementation of Location based Services in Android using GPS and Web Services, International Journal of Computer Science Issues (IJCSI), Vol.9, Issue 1, No. 2, pp. 237-242, 2012.
[3] A. Damani, H. Shah, K. Shah, “Global Positioning System for Object Trackingâ€, International Journal of Computer Application, Vol. 109, No.8, pp.40-45, 2015.
[4] Bisjo, F. Lavagetto, M. Marchese, A. Sciarrone, “GPS/HPS-and Wi- Fi Fingerprint-Based Location Recognition for Check-In Applications Over Smartphones in Cloud-Based LBSsâ€, IEEE, pp. 858-869, 2013.
[5] H. Nishinata, M. Otsuka, K. Asatani, O. Mizuno, H. Kataoka, M. Shimamura, “Proposed Presence System for Safety Confirmationâ€, 16th International Conference on Intelligence in Next Generation Network, 2012.
[6] D. Pankti, J. Pooja, S. Abhishek, “Location Based Services and Integration of Google Maps in Androidâ€, International Journal of Engineering And Computer Science, Volume 3 Issue 3, pp 5072-5077, 2014.
[7] H. Mahmoud, N. Akari, “Shortest Path Calculation : A Comparative Study for Location-Based Recommenderâ€, Word Symposium on Computer Application and Research, 2016.
[8] B. Gedik and L. Liu, “Protecting Location Privacy with Per- sonalized K-Anonymity: Architecture and Algorithms,†IEEE Trans. Mobile Computing, vol. 7, no. 1, 2008, pp. 1–18.
[9] C.-Y. Chow, M. F. Mokbel, and X. Liu, “Spatial Cloaking for Anonymous Location-Based Services in Mobile Peer-to-Peer Environments,†GeoInformatica, vol. 15, no. 2, 2011, pp. 351–80.
[10] Y. Wang et al., “A Fast Privacy-Preserving Framework for Continuous Location-Based Queries in Road Networks,†J. Network and Comp. Applications, vol. 53, 2015, pp. 57–73.
[11] F. Olumofin et al., “Achieving Efficient Query Privacy for Location Based Services,†Proc. Int’l. Symp, Privacy Enhancing Technologies, Springer, 2010, pp. 93–110.
[12] A. Pingley et al., “Protection of Query Privacy for Contin- uous Location Based Services,†Proc. IEEE INFOCOM 2011, 2011, pp. 1710–18.
[13] R. Paulet et al., “Privacy-Preserving and Content-Protecting Location Based Queries,†IEEE Trans. Knowledge and Data Engineering, vol. 26, no. 5, 2014, pp. 1200–10.
[14] Q. Hu et al., “Message in a Concealed Bottle: Achieving Query Content Privacy with Accurate Location-Based Ser- vices,†1st IEEE Symp. Privacy-Aware Computing, 2017.
[15] P. Shankar, V. Ganapathy, and L. Iftode, “Privately Querying Location-Based Services with Sybilquery,†Proc. 11th ACM Int’l. Conf. Ubiquitous Computing, 2009, pp. 31–40.
[16] Avinash Yadlapati, Dr. Hari Kishore Kakarla, “An Advanced AXI Protocol Verification using Verilog HDLâ€, Wulfenia Journal, ISSN: 1561-882X, Volume 22, Number 4, pp. 307-314, April 2015.
[17] P Ramakrishna, K. Hari Kishore, “Design of Low Power 10GS/s 6-Bit DAC using CMOS Technology “International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 226-229, January 2018.
[18] A Murali, K. Hari Kishore, “Efficient and High Speed Key Independent AES Based Authenticated Encryption Architecture using FPGAs “International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 230-233, January 2018.
[19] G.S.Spandana,K Hari Kishore “A Contemporary Approach For Fault Diagnosis In Testable Reversible Circuits By Employing The CNT Gate Library†International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 115, Issue No: 7, Page No: 537-542, September 2017.
[20] K Hari Kishore, CVRN Aswin Kumar, T Vijay Srinivas, GV Govardhan, Ch Naga Pavan Kumar, R Venkatesh “Design and Analysis of High Efficient UART on Spartran-6 and Virtex-7 Devicesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 09 , pp. 23043-23052, June 2015.
[21] K Bindu Bhargavi, K Hari Kishore “Low Power BIST on Memory Interface Logicâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 08 , pp. 21079-21090, May 2015.
[22] Korraprolu Brahma Reddy, K Hari Kishore, “A Mixed Approach for Power Dissipation Reduction in Nanometer CMOS VLSI circuitsâ€, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 9, Number 18 , pp. 5141-5148, July 2014.
[23] Nidamanuri Sai Charan, Kakarla Hari Kishore "Reorganization of Delay Faults in Cluster Based FPGA Using BIST†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.28, page: 1-7, July 2016.
[24] Sravya Kante, Hari Kishore Kakarla, Avinash Yadlapati,"Design and Verification of AMBA AHB-Lite protocol using Verilog HDL" International Journal of Engineering and Technology, E-ISSN No: 0975-4024, Vol No.8, Issue No.2, Page:734-741, May 2016.
[25] Bandlamoodi Sravani, K Hari Kishore, “An FPGA Implementation of Phase Locked Loop (PLL)â€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34137-34139, August 2015
[26] Avinash Yadlapati, Kakarla Hari Kishore,“Constrained Level Validation of Serial Peripheral Interface Protocolâ€, Proceedings of the First International Conference on SCI 2016, Volume 1, Smart Computing and Informatics, Smart Innovation, Systems and Technologies 77, ISSN No: 2190-3018, ISBN: 978-981-10-5544-7, Chapter No: 77, pp. 743-753, 25th December 2017.
[27] P Kiran Kumar, P Prasad Rao, Kakarla Hari Kishore, “Optimal Design of Reversible Parity Preserving New Full Adder / Full Subtractorâ€, IEEE SPONSORED 3rd INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS 2016), pp. 3465-3470, 25th and 26th February 2016.
[28] Y Avinash, K Hari Kishore ‘’Designing Asynchronous FIFO for Low Power DFT Implementation’’ International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 115, Issue No: 8, Page No: 561-566, September 2017
[29] Mahesh Mudavathand K Hari Kishore "Design of RF Front End CMOS Cascade CS Low Noise Amplifier on 65nm Technology Process†International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 115, Issue No: 7, Page No: 417-422, September 2017.
[30] P. Sahithi K Hari Kishore, E Raghuveera, P. Gopi Krishna “DESIGN OF VOLTAGE LEVEL SHIFTER FOR POWER-EFFICIENT APPLICATIONS USING 45nm TECHNOLOGY†International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 2.8, Page No: 103-108, March 2018.
[31] N Bala Dastagiri K Hari Kishore “A 14-bit 10kS/s Power Efficient 65nm SAR ADC for Cardiac Implantable Medical Devices†International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 2.8, Page No: 34-39, March 2018.
[32] Shaik Razia, P.Swathi Pryathyusha, N.Vamsi Krishna “A Comparative study of machine learning algorithms on thyroid disease prediction†International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 2.8, Page No: 315-319, March 2018.
[33] S RAZIA, A REVIEW ON DISEASE DIAGNOSIS USING MACHINE LEARNING TECHNIQUES, International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 117, Issue No: 16, Page No: 79-85, 2017.
[34] S Razia, MR Narasingarao, GR Sridhar, “A decision support system for prediction of thyroid disease-a comparison of multilayer perception neural network and radial basis function neural networkâ€, Journal of Theoretical and Applied Information Technology, ISSN 1992-8645, Volume 80, No. 3 , pp. 544, 2015.
[35] SHAIK RAZIA, M.R.Narasingarao, “Development and Analysis of Support Vector Machine Techniques for Early Prediction of Breast Cancer and Thyroid†Journal of Advanced Research in Dynamical and Control Systems, ISSN: 1943-023X, Vol.9.Sp.Issue:6, page no: 869-878, 2017.
[36] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018
[37] S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179
[38] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
-
Downloads
-
How to Cite
Phanindra Kumar Reddy, P., & P.Singh, S. (2018). Identifying the Node Presence Mobile Wireless Networks to Provide Location Based Services. International Journal of Engineering & Technology, 7(2.24), 365-369. https://doi.org/10.14419/ijet.v7i2.24.12086Received date: 2018-04-24
Accepted date: 2018-04-24
Published date: 2018-04-25