Abstract
With the increasing popularity of location-based services (LBS), the issues caused by users’ location privacy are suffering more and more complicated problems during these years. In this paper, it firstly analyzes the attacks on LBS and the existing protection methods, and then presents a new adaptive routing policy based on mobile multi-agents under LBS environment. For the unique characteristics of multi-agents, the advantages of mobile agents not only ensure the safety of the agent itself, but also protect the privacy of users’ personal information. Then, it presents a multi-agent based adaptive routing policy to improve the speed of selecting the mobile path by using two-level routing tables discussed in this paper. Furthermore, the updating algorithm of improved routing table makes the mobile agents at a lower level of total cost. Finally, we design a simulation experiment to show that the routing policy is feasible, efficient and safe to the LBS platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-based Services Through Spatial and Temporal Cloaking. In: Processing of the International Conference on Mobile Systems, Applications, and Services, MobiSys 2003, pp. 163–168 (2003)
Xue, J., Liu, X.: Road network-oriented method of location privacy protection. Computer Science 34(5), 865–877 (2011)
Duckham, M.: A formal model of obfuscation and negotiation for location privacy. Pervasive (2005)
Mokbel, M.F.: Towards Privacy-aware Location-based Database Services. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (2006)
Shen, X., Zhuang, C.: RBAC-based security policies for mobile agent. Computer Engineering and Design 26(2), 329–331 (2005)
Cui, Y.: Mobile Agents and Security Analysis. Anhui University 26(4), 21–25 (2002)
Liu, Y.: A new mobile agent routing solution. Computer Science 36(11), 113–115 (2009)
Yi, Z., Li, F.: Multi-constrained Routing Algorithm Based on Mobile Agent for Mobile Ad Hoc Networks. Journal of Southwest Jiao Tong University 45(1) (2010)
Peng, C., Li, X.: An Identity-Based Threshold Signcryption Scheme With Semantic Security. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 173–179. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xin, M., Song, G., Wang, Q. (2011). An Approach to the Algorithm for Adaptive Routing Strategy Oriented to Location-Based Services. In: Jin, D., Lin, S. (eds) Advances in Multimedia, Software Engineering and Computing Vol.2. Advances in Intelligent and Soft Computing, vol 129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25986-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-25986-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25985-2
Online ISBN: 978-3-642-25986-9
eBook Packages: EngineeringEngineering (R0)