Skip to main content

Advances, Systems and Applications

Table 4 Performance comparison

From: A trusted de-swinging k-anonymity scheme for location privacy protection

Property

Literature 28

Literature 31

Literature 27

Our scheme

De-swinging

×

×

×

\(\checkmark \)

Hitchhiking attack

×

×

\(\checkmark \ \)

\(\checkmark \)

Location Information Entropy

×

×

×

\(\checkmark \)

Optimal times of pseudonyms usege

\(\checkmark \)

×

×

\(\checkmark \)