![]() ![]() 1, a number of aspects must be considered. In order to build an integrated system as per Fig. In the following section a number of experiments are performed as a preliminary work for this paper. For more reference regarding Location privacy, one can refer to Decker, who has classified both Location Privacy problems and different technical approaches for Location Privacy. Consequently, further investigations must be carried out. In practice this method may have a high score in privacy but when there are many users, it is possible that the server which will have to decrypt and re-assemble the data parts will become over loaded. In other words, even though partial data can be seen by an attacker, it is useless when other parts are not found. As a matter of fact, in GSM user actual ID is already replaced by Temporary Mobile Subscriber Identity or TMSI, anyway. splitting th e sensor’s data and cloaking the user ID (in the ID proxy, p.20) to several parts. But Hoh has come up with the idea of distributing the data i.e. With many scenarios of attacks, including a more brute but effective method, like SIM card cloning, , obviously it is difficult to ensure security, especially so, for mobile phones, as data signal is being transmitted to a free space. proven to have its own strength and weakness.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |