Research Article
Location Privacy Protection Scheme for LBS in IoT
Table 1
Comparison of related works.
| References | Actual road situation considering | Third-party needing | Geohash encoding | -anonymity technology |
| Reference [27] | × | × | √ | × | Reference [28] | × | √ | √ | √ | Reference [29] | × | × | × | × | This article | √ | √ | √ | √ |
|
|