Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (436)

Search Parameters:
Keywords = location privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 751 KiB  
Article
Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
by Saqib Saeed
Big Data Cogn. Comput. 2024, 8(11), 162; https://doi.org/10.3390/bdcc8110162 (registering DOI) - 18 Nov 2024
Viewed by 357
Abstract
Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with user expectations. [...] Read more.
Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with user expectations. In this paper, we have explored the perceptions of the usability of privacy and security settings in mobile applications from mobile users in Saudi Arabia. The findings highlight that gender, age, and education level of users do not have any positive correlation with the privacy and security usability perceptions of mobile users. On the other hand, user concerns about privacy and security and the trustworthiness levels of end users regarding mobile phone privacy and security have a positive impact on end users’ perception of privacy and security usability. Furthermore, privacy usability perception has a positive impact on users’ feelings about their control over the privacy and security of their mobile phones. Based on the results of this empirical study, we propose that user-centric design of privacy and security controls, transparent data handling policies, periodic data management status preview and validation by end users, user education guidelines, strict governmental policies, and automated security settings recommendations can enhance the usability of the privacy and security of mobile phone applications. Our study did not take the geographical location of respondents into account, nor were the respondents balanced based on age and gender. In future work, these weaknesses need to be taken into account, and more qualitative studies can help to extract design guidelines for usable and secure mobile applications. Full article
(This article belongs to the Special Issue Research on Privacy and Data Security)
Show Figures

Figure 1

Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Model to improve usability of privacy and security awareness among mobile users.</p>
Full article ">
21 pages, 526 KiB  
Article
Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANET
by Rudyard Fuster, Patricio Galdames and Claudio Gutierréz-Soto
Appl. Sci. 2024, 14(22), 10480; https://doi.org/10.3390/app142210480 - 14 Nov 2024
Viewed by 263
Abstract
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting [...] Read more.
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of location-based queries (LBQs) to reduce data exposure to untrusted LBS servers. Unlike existing approaches that rely on centralized servers or stationary infrastructure, our solution facilitates direct data exchange between users’ devices, providing an additional layer of privacy protection. We introduce a new privacy entropy-based metric called accumulated privacy loss (APL) to quantify the privacy loss incurred when accessing either the LBS or our proposed system. Our approach implements a two-tier caching strategy: local caching maintained by each user and neighbor caching based on proximity. This strategy not only reduces the number of queries to the LBS server but also significantly enhances user privacy by minimizing the exposure of location data to centralized entities. Empirical results demonstrate that while our collaborative caching system incurs some communication costs, it significantly mitigates redundant data among user caches and reduces the need to access potentially privacy-compromising LBS servers. Our findings show a 40% reduction in LBS queries, a 64% decrease in data redundancy within cells, and a 31% reduction in accumulated privacy loss compared to baseline methods. In addition, we analyze the impact of data obsolescence on cache performance and privacy loss, proposing mechanisms for maintaining the relevance and accuracy of cached data. This work contributes to the field of privacy-preserving LBSs by providing a decentralized, user-centric approach that improves both cache redundancy and privacy protection, particularly in scenarios where central infrastructure is unreachable or untrusted. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>M-LBS system.</p>
Full article ">Figure 2
<p>Network partition with the red circle indicating a user’s coverage area.</p>
Full article ">Figure 3
<p>Number of LBS accesses when the cache size is varied.</p>
Full article ">Figure 4
<p>Number of LBS accesses when the speed of the nodes is varied.</p>
Full article ">Figure 5
<p>Privacy loss for different k-anonymity values across three approaches.</p>
Full article ">Figure 6
<p>Number of queries sent to LBSs and number of query responses from MANET vs. expiration time. Solid lines represent queries sent to LBSs; dashed lines represent query responses from MANET.</p>
Full article ">
19 pages, 1867 KiB  
Article
Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing
by Luis G. Jaimes, Craig White and Paniz Abedin
Sensors 2024, 24(22), 7191; https://doi.org/10.3390/s24227191 - 9 Nov 2024
Viewed by 443
Abstract
In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS [...] Read more.
In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. In this paper, we use a dynamic incentive mechanism based on a recurrent reverse auction model, incorporating vehicular mobility patterns and realistic urban scenarios using the Simulation of Urban Mobility (SUMO) traffic simulator and OpenStreetMap (OSM). By selecting a representative subset of vehicles based on their locations within a fixed budget, our mechanism aims to improve coverage and reduce data redundancy. We evaluate the applicability of successful participatory sensing approaches designed for pedestrian data and demonstrate their limitations when applied to VCS. This research provides insights into adapting greedy algorithms for the particular dynamics of vehicular crowdsensing. Full article
(This article belongs to the Special Issue Intelligent Transportation Systems: Sensing, Automation and Control)
Show Figures

Figure 1

Figure 1
<p>Example of coverage per user.</p>
Full article ">Figure 2
<p>Radius vs. percent utilization (<b>left</b>) and number of participants (<b>right</b>).</p>
Full article ">Figure 3
<p>Cost vs. number of active participants under normal (<b>left</b>), exponential (<b>center</b>), and uniform (<b>right</b>) distributions.</p>
Full article ">Figure 4
<p>Number of samples vs. percentage area coverage (<b>left</b>), number of active participants (<b>center</b>), and cost (<b>right</b>).</p>
Full article ">Figure 5
<p>Simulation components.</p>
Full article ">Figure 6
<p>Normal distribution for trajectory distribution and participants’ true valuations.</p>
Full article ">Figure 7
<p>Exponential distribution for trajectory distribution and participants’ true valuations.</p>
Full article ">Figure 8
<p>Budget vs. coverage, number of participants, and budget utilization under uniform distribution for trajectory locations and participant true valuations.</p>
Full article ">Figure 9
<p>Budget vs. coverage, number of participants, and budget utilization under uniform and normal distributions for trajectory locations and participant true valuations, respectively.</p>
Full article ">Figure 10
<p>Budget vs. coverage, number of participants, and budget utilization under normal and uniform distributions for trajectory locations and participant true valuations, respectively.</p>
Full article ">
41 pages, 438 KiB  
Review
Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends
by Christos Papadopoulos, Konstantinos-Filippos Kollias and George F. Fragulis
Future Internet 2024, 16(11), 415; https://doi.org/10.3390/fi16110415 - 9 Nov 2024
Viewed by 566
Abstract
Federated learning (FL) is creating a paradigm shift in machine learning by directing the focus of model training to where the data actually exist. Instead of drawing all data into a central location, which raises concerns about privacy, costs, and delays, FL allows [...] Read more.
Federated learning (FL) is creating a paradigm shift in machine learning by directing the focus of model training to where the data actually exist. Instead of drawing all data into a central location, which raises concerns about privacy, costs, and delays, FL allows learning to take place directly on the device, keeping the data safe and minimizing the need for transfer. This approach is especially important in areas like healthcare, where protecting patient privacy is critical, and in industrial IoT settings, where moving large numbers of data is not practical. What makes FL even more compelling is its ability to reduce the bias that can occur when all data are centralized, leading to fairer and more inclusive machine learning outcomes. However, it is not without its challenges—particularly with regard to keeping the models secure from attacks. Nonetheless, the potential benefits are clear: FL can lower the costs associated with data storage and processing, while also helping organizations to meet strict privacy regulations like GDPR. As edge computing continues to grow, FL’s decentralized approach could play a key role in shaping how we handle data in the future, moving toward a more privacy-conscious world. This study identifies ongoing challenges in ensuring model security against adversarial attacks, pointing to the need for further research in this area. Full article
(This article belongs to the Special Issue IoT Security: Threat Detection, Analysis and Defense)
Show Figures

Figure 1

Figure 1
<p>Federated learning architecture.</p>
Full article ">Figure 2
<p>Types of FL.</p>
Full article ">
10 pages, 251 KiB  
Article
Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study
by Stephen Sibbett, Jamie Oh, Gretchen Carrougher, Lara Muffley, Nathaniel Ashford, Maiya Pacleb, Samuel Mandell, Jeffrey Schneider, Steven Wolf, Barclay Stewart and Nicole S. Gibran
Eur. Burn J. 2024, 5(4), 389-398; https://doi.org/10.3390/ebj5040034 - 6 Nov 2024
Viewed by 626
Abstract
In this study, we aimed to integrate a genetic repository with an existing longitudinal national burn database. We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an [...] Read more.
In this study, we aimed to integrate a genetic repository with an existing longitudinal national burn database. We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. Dubbed the worrier/warrior gene, COMT variants have been associated with varying phenotypes of post-traumatic stress, wellbeing, and resilience. Between August 2018 and July 2020, COMT variants were identified for 111 participants from three sites and correlated with their outcome data. We found no association between COMT variants and functional outcomes, likely due to the inadequate sample size. We also asked all potential participants why they consented to or refused genetic analysis. A thematic analysis of responses revealed altruism and personal interest/enthusiasm in the study as top reasons for consenting. Privacy concerns were the most common reason for refusal. In conclusion, we successfully developed standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing database, and we demonstrated the feasibility of conducting a multicenter collaborative study using a centralized lab location. Full article
29 pages, 1121 KiB  
Article
Barriers to Sexual and Reproductive Health and Rights of Migrant and Refugee Youth: An Exploratory Socioecological Qualitative Analysis
by Michaels Aibangbee, Sowbhagya Micheal, Pranee Liamputtong, Rashmi Pithavadian, Syeda Zakia Hossain, Elias Mpofu and Tinashe Moira Dune
Youth 2024, 4(4), 1538-1566; https://doi.org/10.3390/youth4040099 - 1 Nov 2024
Viewed by 464
Abstract
(1) Background: Migrant and refugee youth’s (MRY’s) sexual and reproductive health and rights (SRHRs) are a global health issue. MRY encounter adverse SRH experiences due to limited access to and knowledge of SRHRs services. Using a socioecological framework, this study examined the barriers [...] Read more.
(1) Background: Migrant and refugee youth’s (MRY’s) sexual and reproductive health and rights (SRHRs) are a global health issue. MRY encounter adverse SRH experiences due to limited access to and knowledge of SRHRs services. Using a socioecological framework, this study examined the barriers affecting MRY’s SRHRs. (2) Methods: A cross-sectional study utilising a participatory action research design was used. A total of 87 MRY (ages 16–26, from 20 cultural groups within Greater Western Sydney, Australia) completed seventeen focus group discussions on their SRHRs experiences. The focus groups were co-facilitated by youth project liaisons to ensure their authenticity and validity. The data were analysed thematically and interpreted using socioecological theory. (3) Results: The findings identified socioecological barriers, a lack of awareness about and access to services, and sociocultural dissonance as leading to the under-implementation of SRHRs services. These barriers included cultural disconnects, language barriers, remote service locations, intergenerational cultural conflicts, and ineffective SRHRs services. The key themes identified included traditional and institutional stigma, lack of SRH education, reliance on social media for SRH information, and privacy concerns. (4) Conclusions: There is a limited consideration of MRY’s SRHRs and the impact of intergenerational discordance and stigma on MRY’s rights. The findings suggest the necessity for a collaborative SRHRs strategy and policy design that empowers MRY’s agency across multicultural contexts. Full article
(This article belongs to the Special Issue Sexuality: Health, Education and Rights)
Show Figures

Figure 1

Figure 1
<p>Bronfenbrenner’s socioecological framework (1997).</p>
Full article ">Figure 2
<p>Socioecological barriers affecting MRY’s SRHRs using Bronfenbrenner’s socioecological framework (Sydney, July 2023).</p>
Full article ">
17 pages, 1418 KiB  
Article
A Genetic Optimized Federated Learning Approach for Joint Consideration of End-to-End Delay and Data Privacy in Vehicular Networks
by Müge Erel-Özçevik, Akın Özçift, Yusuf Özçevik and Fatih Yücalar
Electronics 2024, 13(21), 4261; https://doi.org/10.3390/electronics13214261 - 30 Oct 2024
Viewed by 440
Abstract
In 5G vehicular networks, two key challenges have become apparent, including end-to-end delay minimization and data privacy. Learning-based approaches have been used to alleviate these, either by predicting delay or protecting privacy. Traditional approaches train machine learning models on local devices or cloud [...] Read more.
In 5G vehicular networks, two key challenges have become apparent, including end-to-end delay minimization and data privacy. Learning-based approaches have been used to alleviate these, either by predicting delay or protecting privacy. Traditional approaches train machine learning models on local devices or cloud servers, each with their own trade-offs. While pure-federated learning protects privacy, it sacrifices delay prediction performance. In contrast, centralized training improves delay prediction but violates privacy. Existing studies in the literature overlook the effect of training location on delay prediction and data privacy. To address both issues, we propose a novel genetic algorithm optimized federated learning (GAoFL) approach in which end-to-end delay prediction and data privacy are jointly considered to obtain an optimal solution. For this purpose, we analytically define a novel end-to-end delay formula and data privacy metrics. Accordingly, a novel fitness function is formulated to optimize both the location of training model and data privacy. In conclusion, according to the evaluation results, it can be advocated that the outcomes of the study highlight that training location significantly affects privacy and performance. Moreover, it can be claimed that the proposed GAoFL improves data privacy compared to centralized learning while achieving better delay prediction than other federated methods, offering a valuable solution for 5G vehicular computing. Full article
(This article belongs to the Special Issue Intelligent Technologies for Vehicular Networks, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Preliminary analysis on end-to-end delay and data privacy.</p>
Full article ">Figure 2
<p>The proposed system architecture for the GAoFL approach based on genetic algorithm with 4 steps: 1—parent selection, 2—recombination, 3—mutation, and 4—survivor selection.</p>
Full article ">Figure 3
<p>Precision and recall results of the proposed GAoFL approach for each round when N is 100.</p>
Full article ">Figure 4
<p><span class="html-italic">Fmeasure</span> and <span class="html-italic">T</span> results of proposed GAoFL approach for each round when N is 100.</p>
Full article ">Figure 5
<p>Overall comparison of proposed GAoFL approach and the other approaches in the literature.</p>
Full article ">Figure 6
<p>The processing time analysis of GAoFL with different machine learning algorithms in terms of increased iteration number and tasks.</p>
Full article ">
18 pages, 1210 KiB  
Review
A Narrative Review of Identity, Data and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing
by Syed Raza Bashir, Shaina Raza and Vojislav Misic
Electronics 2024, 13(21), 4228; https://doi.org/10.3390/electronics13214228 - 28 Oct 2024
Viewed by 572
Abstract
As digital technology advances, the proliferation of connected devices poses significant challenges and opportunities in mobile crowdsourcing and edge computing. This narrative review focuses on the need for privacy protection in these fields, emphasizing the increasing importance of data security in a data-driven [...] Read more.
As digital technology advances, the proliferation of connected devices poses significant challenges and opportunities in mobile crowdsourcing and edge computing. This narrative review focuses on the need for privacy protection in these fields, emphasizing the increasing importance of data security in a data-driven world. Through an analysis of contemporary academic literature, this review provides an understanding of the current trends and privacy concerns in mobile crowdsourcing and edge computing. We present insights and highlight advancements in privacy-preserving techniques, addressing identity, data, and location privacy. This review also discusses the potential directions that can be useful resources for researchers, industry professionals, and policymakers. Full article
(This article belongs to the Special Issue Data Security and Data Analytics in Cloud Computing)
Show Figures

Figure 1

Figure 1
<p>Publication trend on privacy in edge computing and mobile crowdsourcing in recent years. The full year 2024 is not covered, so additional publications are expected.</p>
Full article ">Figure 2
<p>Top publishers by number of publications in the field.</p>
Full article ">Figure 3
<p>Publication trends over time by topic.</p>
Full article ">Figure 4
<p>Flow of the privacy-preserving methods covered in this work.</p>
Full article ">Figure 5
<p>Anatomy of a mobile crowdsourcing campaign.</p>
Full article ">Figure 6
<p>Edge computing architecture illustrating the interplay between user, edge, and cloud layers.</p>
Full article ">
44 pages, 5949 KiB  
Review
Review of Authentication, Blockchain, Driver ID Systems, Economic Aspects, and Communication Technologies in DWC for EVs in Smart Cities Applications
by Narayanamoorthi Rajamanickam, Pradeep Vishnuram, Dominic Savio Abraham, Miroslava Gono, Petr Kacor and Tomas Mlcak
Smart Cities 2024, 7(6), 3121-3164; https://doi.org/10.3390/smartcities7060122 - 24 Oct 2024
Viewed by 649
Abstract
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a [...] Read more.
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a receiver located on the underside of the EV. Dynamic charging offers a solution to the issue of range anxiety by allowing EVs to charge while in motion, thereby reducing the need for frequent stops. This manuscript reviews several pivotal areas critical to the future of EV DWC technology such as authentication techniques, blockchain applications, driver identification systems, economic aspects, and emerging communication technologies. Ensuring secure access to this charging infrastructure requires fast, lightweight authentication systems. Similarly, blockchain technology plays a critical role in enhancing the Internet of Vehicles (IoV) architecture by decentralizing and securing vehicular networks, thus improving privacy, security, and efficiency. Driver identification systems, crucial for EV safety and comfort, are analyzed. Additionally, the economic feasibility and impact of DWC are evaluated, providing essential insights into its potential effects on the EV ecosystem. The paper also emphasizes the need for quick and lightweight authentication systems to ensure secure access to DWC infrastructure and discusses how blockchain technology enhances the efficiency, security, and privacy of IoV networks. The importance of driver identification systems for comfort and safety is evaluated, and an economic study confirms the viability and potential benefits of DWC for the EV ecosystem. Full article
Show Figures

Figure 1

Figure 1
<p>Sectional-wise structure of the manuscript.</p>
Full article ">Figure 2
<p>DWC system: (<b>a</b>) Elongated rails; (<b>b</b>) Lumped pads; (<b>c</b>) Elongated pads.</p>
Full article ">Figure 3
<p>(<b>a</b>) DWC schematic; (<b>b</b>) Top view expressway.</p>
Full article ">Figure 3 Cont.
<p>(<b>a</b>) DWC schematic; (<b>b</b>) Top view expressway.</p>
Full article ">Figure 4
<p>Process of symmetric encryption.</p>
Full article ">Figure 5
<p>Sample four-key hash chain.</p>
Full article ">Figure 6
<p>Architecture model of FLPA (A-Auth: anonymous authentication, PAT: payment authorization token, RTA: registration trusted authority).</p>
Full article ">Figure 7
<p>Blockchain and IoV architecture.</p>
Full article ">Figure 8
<p>Applications of blockchain in IoV.</p>
Full article ">Figure 9
<p>Blockchain applications in IoV—grouping according to their areas of application.</p>
Full article ">Figure 10
<p>Blockchain application areas in the IoV.</p>
Full article ">Figure 11
<p>Restrictions of using blockchain in IoV-assisted smart grids.</p>
Full article ">Figure 12
<p>Data classifications for driver identification.</p>
Full article ">Figure 13
<p>Categorization of driver identification techniques.</p>
Full article ">Figure 14
<p>The RF model’s guiding principle.</p>
Full article ">Figure 15
<p>Structure of RNN.</p>
Full article ">Figure 16
<p>The hybrid model used by Hammann et al. [<a href="#B126-smartcities-07-00122" class="html-bibr">126</a>].</p>
Full article ">Figure 17
<p>The hybrid model pre-processing and model introduction.</p>
Full article ">Figure 18
<p>V2X communication of EVs.</p>
Full article ">Figure 19
<p>Implementing ML algorithms for forecasting EV.</p>
Full article ">Figure 20
<p>Publications on blockchain for EVs.</p>
Full article ">Figure 21
<p>Blockchain network of EV transportation.</p>
Full article ">
9 pages, 197 KiB  
Article
Eight Conditions That Will Change Mining Work in Mining 4.0
by Joel Lööw and Jan Johansson
Mining 2024, 4(4), 904-912; https://doi.org/10.3390/mining4040050 - 24 Oct 2024
Viewed by 823
Abstract
The mining industry is undergoing a transformation driven by the adoption of Industry 4.0 technologies, implementing autonomous trucks, drones, positions systems, and similar technologies. This article, drawing on experiences and observations from several studies conducted in the mining industry, explores the impact of [...] Read more.
The mining industry is undergoing a transformation driven by the adoption of Industry 4.0 technologies, implementing autonomous trucks, drones, positions systems, and similar technologies. This article, drawing on experiences and observations from several studies conducted in the mining industry, explores the impact of these technologies on mining work. It identifies eight key potential changes in working conditions. Firstly, routine and dangerous tasks are increasingly automated, reducing physical strain but potentially leading to job displacement and increased maintenance demands. Secondly, operators and managers are shifting toward handling disturbances and training algorithms, as AI takes over decision-making processes. Thirdly, managers are responsible for more capital with fewer people, potentially altering managerial roles and spans of control. Fourthly, the global connectivity of operations makes the world both larger and smaller, with a universal language blurring boundaries. Fifthly, work becomes location-independent, allowing for remote operation and management. Sixthly, the distinction between work and private life blurs, with increased availability expected from operators and managers. Seventhly, technology expands human senses, providing real-time data and situational awareness. Eighthly and lastly, the pervasive collection and retention of data create a scenario where one’s history is inescapable, raising concerns about data ownership and privacy. These changes necessitate a strategic response from the mining industry to ensure socially sustainable technology development and to attract a future workforce. Full article
(This article belongs to the Special Issue Envisioning the Future of Mining, 2nd Edition)
9 pages, 1242 KiB  
Entry
Geomasking to Safeguard Geoprivacy in Geospatial Health Data
by Jue Wang
Encyclopedia 2024, 4(4), 1581-1589; https://doi.org/10.3390/encyclopedia4040103 - 21 Oct 2024
Viewed by 683
Definition
Geomasking is a set of techniques that introduces noise or intentional errors into geospatial data to minimize the risk of identifying exact location information related to individuals while preserving the utility of the data to a controlled extent. It protects the geoprivacy of [...] Read more.
Geomasking is a set of techniques that introduces noise or intentional errors into geospatial data to minimize the risk of identifying exact location information related to individuals while preserving the utility of the data to a controlled extent. It protects the geoprivacy of the data contributor and mitigates potential harm from data breaches while promoting safer data sharing. The development of digital health technologies and the extensive use of individual geospatial data in health studies have raised concerns about geoprivacy. The individual tracking data and health information, if accessed by unauthorized parties, may lead to privacy invasions, criminal activities, and discrimination. These risks underscore the importance of robust protective measures in the collection, management, and sharing of sensitive data. Geomasking techniques have been developed to safeguard geoprivacy in geospatial health data, addressing the risks and challenges associated with data sharing. This entry paper discusses the importance of geoprivacy in geospatial health data and introduces various kinds of geomasking methods and their applications in balancing the protection of individual privacy with the need for data sharing to ensure scientific reproducibility, highlighting the urgent need for more effective geomasking techniques and their applications. Full article
(This article belongs to the Section Mathematics & Computer Science)
Show Figures

Figure 1

Figure 1
<p>Affine transformation geomasking methods (Orange dots: original locations, green dots: geomasked locations).</p>
Full article ">Figure 2
<p>Aggregation geomasking methods (Hollow circles represent original locations; numbers within each region indicate the aggregated value; the shading of solid circles and regions represents the associated weight after aggregation).</p>
Full article ">Figure 3
<p>Naïve random perturbation geomasking methods (Orange dots: original locations, green dots: geomasked locations; dotted lines: the radius of the designated geomasking area; solid lines: the relocation of records from their original locations to the geomasked locations).</p>
Full article ">Figure 4
<p>Geomasking methods involving random perturbation with distribution functions (Orange dots: original locations, green dots: geomasked locations; solid lines: the relocation of records from their original locations to the geomasked locations).</p>
Full article ">Figure 5
<p>Geomasking methods involving random perturbation with preset potential locations (Dotted lines: the radius of the designated geomasking area; solid lines: the relocation of records from their original locations to the geomasked locations).</p>
Full article ">
28 pages, 1126 KiB  
Article
Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain
by Godlove Suila Kuaban, Valery Nkemeni, Onyeka J. Nwobodo, Piotr Czekalski and Fabien Mieyeville
Future Internet 2024, 16(10), 376; https://doi.org/10.3390/fi16100376 - 16 Oct 2024
Viewed by 681
Abstract
The Internet of Things (IoT) has emerged as a transformative technology with the potential to revolutionize various sectors and industries worldwide. Despite its global significance, the adoption and implementation of IoT technologies in emerging technology ecosystems within the Central African region still need [...] Read more.
The Internet of Things (IoT) has emerged as a transformative technology with the potential to revolutionize various sectors and industries worldwide. Despite its global significance, the adoption and implementation of IoT technologies in emerging technology ecosystems within the Central African region still need to be studied and explored. This paper presents a case study of the Silicon Mountain technology ecosystem, located in Fako division of the southwest region of Cameroon, focusing on the barriers and challenges to adopting and integrating IoT technologies within this emerging tech ecosystem. Through a survey-based approach, we investigate the factors influencing IoT adoption in the Silicon Mountain tech ecosystem, including technological, economic, social, and regulatory factors. Our study reveals key insights into the current state of IoT adoption, opportunities for growth and innovation, and IoT adoption challenges. Key among the challenges identified for impeding IoT uptake were issues related to standardization and financial resources, labor shortage in the industry, educational and knowledge gaps, market challenges, government policies, security and data privacy concerns, and inadequate power supply. Based on our findings, we provide recommendations for policymakers, industry stakeholders, and academic institutions to promote and facilitate the widespread adoption of IoT technologies in Silicon Mountain and the Central African region at large. Full article
Show Figures

Figure 1

Figure 1
<p>Respondents’ affiliation within the Silicon Mountain technology ecosystem.</p>
Full article ">Figure 2
<p>Respondents’ field of specialization.</p>
Full article ">Figure 3
<p>Respondents’ identification of potential areas for the implementation of the Internet of Things in the Central African sub-region.</p>
Full article ">
20 pages, 2412 KiB  
Article
Decoupling Online Ride-Hailing Services: A Privacy Protection Scheme Based on Decentralized Identity
by Nigang Sun, Yuxuan Liu, Yuanyi Zhang and Yining Liu
Electronics 2024, 13(20), 4060; https://doi.org/10.3390/electronics13204060 - 15 Oct 2024
Viewed by 639
Abstract
Online ride-hailing services have become a vital component of urban transportation worldwide due to their convenience and flexibility. However, the expansion of their user base has dramatically heightened the risks of user privacy information leakage. Among these risks, the privacy leakage problem caused [...] Read more.
Online ride-hailing services have become a vital component of urban transportation worldwide due to their convenience and flexibility. However, the expansion of their user base has dramatically heightened the risks of user privacy information leakage. Among these risks, the privacy leakage problem caused by the direct correlation between user (driver and passenger) identity information and location-based ride information is of particular concern. This paper proposes a novel privacy protection scheme for ride-hailing services. In this scheme, decentralized identities are employed for user authentication, separating the identity registration service from the ride-hailing platform, thereby preventing the platform from obtaining user privacy data. The scheme also employs a fuzzy matching strategy based on location Points of Interest (POI) and a ciphertext-policy attribute-based hybrid encryption algorithm to hide the user’s precise location and restrict access to location information. Crucially, the scheme achieves the complete decoupling of identity registration services and location-based ride services on the ride-hailing platform, ensuring that users’ real identities and ride data cannot be directly associated, effectively protecting user privacy. Within the decoupled architecture, regulatory authorities are established to handle emergencies within ride-hailing services. Through simulation experiments and security analysis, this scheme is demonstrated to be both feasible and practical, providing a new privacy protection solution for the ride-hailing industry. Full article
(This article belongs to the Special Issue Network and Mobile Systems Security, Privacy and Forensics)
Show Figures

Figure 1

Figure 1
<p>System architecture.</p>
Full article ">Figure 2
<p>User authentication.</p>
Full article ">Figure 3
<p>Fuzzy location selection.</p>
Full article ">Figure 4
<p>Key pair generation.</p>
Full article ">Figure 5
<p>DID document generation.</p>
Full article ">Figure 6
<p>DID and DID document.</p>
Full article ">Figure 7
<p>Match result.</p>
Full article ">Figure 8
<p>Match processing time.</p>
Full article ">Figure 9
<p>Hybrid encryption algorithm overhead.</p>
Full article ">
20 pages, 1508 KiB  
Article
Secure Unmanned Aerial Vehicle Communication in Dual-Function Radar Communication System by Exploiting Constructive Interference
by Qian Xu, Jia Yi, Xianyu Wang, Ming-bo Niu, Md. Sipon Miah and Ling Wang
Drones 2024, 8(10), 581; https://doi.org/10.3390/drones8100581 - 15 Oct 2024
Viewed by 575
Abstract
In contrast from traditional unmanned aerial vehicle communication via unlicensed spectrum, connecting unmanned aerial vehicles with cellular networks can extend their communication coverage and improve the quality of their service. In addition, the emerging dual-functional radar communication paradigm in cellular systems can better [...] Read more.
In contrast from traditional unmanned aerial vehicle communication via unlicensed spectrum, connecting unmanned aerial vehicles with cellular networks can extend their communication coverage and improve the quality of their service. In addition, the emerging dual-functional radar communication paradigm in cellular systems can better meet the requirements of location-sensitive tasks such as reconnaissance and cargo delivery. Based on the above considerations, in this paper, we study the simultaneous communication and target sensing issue in cellular-connected unmanned aerial vehicle systems. Specifically, we consider a two-cell coordinated system with two base stations, cellular unmanned aerial vehicles, and potential aerial targets. In such systems, the communication security issue of cellular unmanned aerial vehicles regarding eavesdropping on their target is inevitable since the main beam of the transmit waveform needs to point to the direction of the target for achieving a sufficient detection performance. Aiming at protecting the privacy of cellular transmission as well as performing target sensing, we exploit the physical layer security technique with the aid of constructive interference-based precoding. A transmit power minimization problem is formulated with constraints on secure and reliable cellular transmission and a sufficient radar signal-to-interference-plus-noise ratio. By specially designing the transmit beamforming vectors at the base stations, the received signals at the cellular users are located in the decision regions of the transmitted symbols while the targets can only receive wrong symbols. We also compare the performance of the proposed scheme with that of the traditional one without constructive interference. The simulation results show that the proposed constructive interference-based strategy can meet the requirements of simultaneous target sensing and secure communication, and also save transmit power compared with the traditional scheme. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

Figure 1
<p>System model: a two-cell DFRC system where UAVs are cellular users and targets are potential eavesdroppers.</p>
Full article ">Figure 2
<p>The concept of CI-based secure precoding for 8PSK modulation, where <math display="inline"><semantics> <msub> <mi>s</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>k</mi> </mrow> </msub> </semantics></math> is the symbol of interest and the two dashed red lines represent the decision boundaries of <math display="inline"><semantics> <msub> <mi>s</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>k</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>Convergence of the proposed CI-based precoding scheme for different numbers of transmit antennas.</p>
Full article ">Figure 4
<p>Received signals at <math display="inline"><semantics> <msub> <mi>CU</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>1</mn> </mrow> </msub> </semantics></math> and target 1, assuming that the transmitted symbol for <math display="inline"><semantics> <msub> <mi>CU</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>1</mn> </mrow> </msub> </semantics></math> is fixed as the one located in the first quadrant of the QPSK constellation.</p>
Full article ">Figure 5
<p>SER comparison between the CU and the target.</p>
Full article ">Figure 6
<p>Normalized beam patterns generated by the proposed CI-based precoding.</p>
Full article ">Figure 7
<p>Transmit SNR comparison between the CI-based precoding and the traditional precoding schemes.</p>
Full article ">Figure 8
<p>Transmit SNR comparison between the CI-based precoding and the traditional precoding schemes for different PSK modulation orders.</p>
Full article ">
18 pages, 614 KiB  
Review
An Evaluation on the Potential of Large Language Models for Use in Trauma Triage
by Kelvin Le, Jiahang Chen, Deon Mai and Khang Duy Ricky Le
Emerg. Care Med. 2024, 1(4), 350-367; https://doi.org/10.3390/ecm1040035 - 12 Oct 2024
Viewed by 627
Abstract
Large Language Models (LLMs) are becoming increasingly adopted in various industries worldwide. In particular, there is emerging research assessing the reliability of LLMs, such as ChatGPT, in performing triaging decisions in emergent settings. A unique aspect of emergency triaging is the process of [...] Read more.
Large Language Models (LLMs) are becoming increasingly adopted in various industries worldwide. In particular, there is emerging research assessing the reliability of LLMs, such as ChatGPT, in performing triaging decisions in emergent settings. A unique aspect of emergency triaging is the process of trauma triaging. This process requires judicious consideration of mechanism of injury, severity of injury, patient stability, logistics of location and type of transport in order to ensure trauma patients have access to appropriate and timely trauma care. Current issues of overtriage and undertriage highlight the potential for the use of LLMs as a complementary tool to assist in more accurate triaging of the trauma patient. Despite this, there remains a gap in the literature surrounding the utility of LLMs in the trauma triaging process. This narrative review explores the current evidence for the potential for implementation of LLMs in trauma triaging. Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of artificial intelligence, which broadly defines intelligent computer systems. Large language models are types of deep learning models, which are subsets of machine learning models.</p>
Full article ">
Back to TopTop