Research Article

Location Privacy Protection Scheme for LBS in IoT

Figure 5

The attack model.