Research Article
Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries
Table 1
Security comparison chart for multi-LBS queries.
| Protocols | Attacker knowledge | LHA | MM | MQA | MMB | VBA | KA |
| Xu and Cai [21] | X | O | O | O | X | X | Xu and Cai [14] | O | O | O | O | X | X | Shankar et al. [15] | O | O | O | O | O | O | Wang and Liu [22] | O | O | X | O | O | X | Ardagna et al. [20] | O | O | O | X | O | O | Lee et al. [23] | O | O | O | O | X | X | Song et al. [24] | O | O | O | O | X | X | Niu et al. [25] | O | O | O | O | X | X | Niu et al. [3] | X | O | X | O | O | O | Our scheme | O | O | O | O | O | O |
|
|