Research Article

Location Privacy Protection Scheme for LBS in IoT

Table 1

Comparison of related works.

ReferencesActual road situation consideringThird-party needingGeohash encoding-anonymity technology

Reference [27]×××
Reference [28]×
Reference [29]××××
This article