{"id":"https://openalex.org/W2533200335","doi":"https://doi.org/10.1109/tifs.2017.2713341","title":"Achieving Perfect Location Privacy in Wireless Devices Using Anonymization","display_name":"Achieving Perfect Location Privacy in Wireless Devices Using Anonymization","publication_year":2017,"publication_date":"2017-06-12","ids":{"openalex":"https://openalex.org/W2533200335","doi":"https://doi.org/10.1109/tifs.2017.2713341","mag":"2533200335"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2713341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2713341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051173693","display_name":"Zarrin Montazeri","orcid":"https://orcid.org/0000-0001-8160-9616"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zarrin Montazeri","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts at Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts at Amherst, Amherst, MA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018588864","display_name":"Amir Houmansadr","orcid":"https://orcid.org/0000-0002-7553-6657"},"institutions":[{"id":"https://openalex.org/I177605424","display_name":"Amherst College","ror":"https://ror.org/028vqfs63","country_code":"US","type":"education","lineage":["https://openalex.org/I177605424"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Houmansadr","raw_affiliation_strings":["College of Information and Computer Sciences, University of Massachusetts at Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information and Computer Sciences, University of Massachusetts at Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I177605424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009685038","display_name":"Hossein Pishro-Nik","orcid":"https://orcid.org/0000-0002-7249-2548"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hossein Pishro-Nik","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts at Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts at Amherst, Amherst, MA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051173693"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.0457,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.96920471,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"12","issue":"11","first_page":"2683","last_page":"2698"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8239156603813171},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.723903238773346},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5946277976036072},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.5932231545448303},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.5306528806686401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5083057284355164},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4728403687477112},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4491890072822571},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.43072718381881714},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4137211740016937},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.39641427993774414},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15876764059066772}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8239156603813171},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.723903238773346},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5946277976036072},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.5932231545448303},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.5306528806686401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5083057284355164},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4728403687477112},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4491890072822571},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.43072718381881714},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4137211740016937},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.39641427993774414},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15876764059066772},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2713341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2713341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1649670075","display_name":null,"funder_award_id":"CNS 1525642","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3700972868","display_name":null,"funder_award_id":"CCF 0844725","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7178980665","display_name":null,"funder_award_id":"CCF 1421957","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W205333855","https://openalex.org/W1532761024","https://openalex.org/W1536564267","https://openalex.org/W1565026843","https://openalex.org/W1565303400","https://openalex.org/W1622686296","https://openalex.org/W1658920975","https://openalex.org/W1689932539","https://openalex.org/W1890412134","https://openalex.org/W1982590063","https://openalex.org/W1985675795","https://openalex.org/W1992263322","https://openalex.org/W1994292329","https://openalex.org/W1994952354","https://openalex.org/W1997127735","https://openalex.org/W2045686369","https://openalex.org/W2056773559","https://openalex.org/W2060871119","https://openalex.org/W2066808965","https://openalex.org/W2071342505","https://openalex.org/W2076675165","https://openalex.org/W2077145963","https://openalex.org/W2082894754","https://openalex.org/W2097858741","https://openalex.org/W2103839502","https://openalex.org/W2116347193","https://openalex.org/W2120911939","https://openalex.org/W2126818112","https://openalex.org/W2128870831","https://openalex.org/W2133117051","https://openalex.org/W2139211263","https://openalex.org/W2147324825","https://openalex.org/W2159024459","https://openalex.org/W2294409705","https://openalex.org/W2343248474","https://openalex.org/W2344355863","https://openalex.org/W2540134115","https://openalex.org/W2575618390","https://openalex.org/W2583266863","https://openalex.org/W3098835986","https://openalex.org/W3101704102","https://openalex.org/W3103861542","https://openalex.org/W4255574744","https://openalex.org/W6675506999","https://openalex.org/W6732765934"],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W2101582069","https://openalex.org/W2219269088","https://openalex.org/W2127814706","https://openalex.org/W2584827882","https://openalex.org/W2118333568","https://openalex.org/W2036595207","https://openalex.org/W2994243660","https://openalex.org/W2528109871","https://openalex.org/W1598195095"],"abstract_inverted_index":{"The":[0],"popularity":[1],"of":[2,17,31,107,136,147,199],"mobile":[3],"devices":[4],"and":[5,142],"location-based":[6],"services":[7],"(LBSs)":[8],"has":[9,127],"raised":[10],"significant":[11],"concerns":[12],"regarding":[13],"the":[14,29,64,105,108,119,125,134,137,140,145,177,189,197,202],"location":[15,25,43,49,67,72,87,129,169],"privacy":[16,26,73,170],"their":[18],"users.":[19],"A":[20],"popular":[21],"approach":[22],"to":[23,62,159],"protect":[24],"is":[27,88,110,133,144,171,180,196],"anonymizing":[28],"users":[30,138],"LBS":[32,60],"systems.":[33],"In":[34],"this":[35,95],"paper,":[36],"we":[37,46,81,101,152],"introduce":[38],"an":[39],"information-theoretic":[40],"notion":[41],"for":[42,77,121,173,191],"privacy,":[44],"which":[45],"call":[47],"perfect":[48,66,71,128,168],"privacy.":[50,68,130],"We":[51,69,165],"then":[52,124],"demonstrate":[53],"how":[54],"anonymization":[55],"should":[56],"be":[57],"used":[58],"by":[59,118,188],"systems":[61],"achieve":[63],"defined":[65],"study":[70],"under":[74],"two":[75],"models":[76],"user":[78,109,126,175],"movements.":[79],"First,":[80],"assume":[82],"that":[83,103,122,167,192],"a":[84,174],"user's":[85,178,203],"current":[86],"independent":[89,96],"from":[90],"her":[91],"past":[92],"locations.":[93,150],"Using":[94],"identically":[97],"distributed":[98],"(i.i.d.)":[99],"model,":[100],"show":[102,166],"if":[104,176],"pseudonym":[106,179],"changed":[111,181],"before":[112,182],"O(n2/r-1":[113],")":[114],"observations":[115,185],"are":[116,186],"made":[117],"adversary":[120,190],"user,":[123,193],"Here,":[131],"n":[132],"number":[135,146,198],"in":[139,201],"network":[141],"r":[143],"all":[148],"possible":[149],"Next,":[151],"model":[153,161],"users'":[154],"movements":[155],"using":[156],"Markov":[157,204],"chains":[158],"better":[160],"real-world":[162],"movement":[163],"patterns.":[164],"achievable":[172],"O(n":[183],"2/IEI-r":[184],"collected":[187],"where":[194],"IEI":[195],"edges":[200],"chain":[205],"model.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
