Enhancing Source Location Privacy in Networked Systems: A Review

Pooja Negi*, Prashant Rajput**, Devendra Singh Bisht***
* Department of Education, Amrapali University, Shiksha Nagar, Lamachaur, Haldwani, Uttarakhand, India.
** Department of Computer Science, Amrapali University, Shiksha Nagar, Lamachaur, Haldwani, Uttarakhand, India.
*** Soban Singh Jeena University, Almora, Uttarakhand, India.
Periodicity:January - June'2025

Abstract

Source location privacy has become a critical issue in networked systems. At present, many applications are utilizing networked systems because of the popularity of smartphone users. Protecting the privacy of the source location is important to keep private user data safe from people who want to use location data for criminal purposes. This article gives a comprehensive examination of all the current research initiatives, procedures, and strategies of implementation designed to improve source location privacy in networked systems. The methods were classified as per their basic ideas, and ratings were given on the basis of their effectiveness, usability, and shortcomings. Furthermore, this study identifies open research challenges and suggests potential opportunities for future studies to enhance the state-of-the-art in source location privacy protection.

Keywords

Networked Systems, Privacy Preservation, Adversary Models, Privacy Challenges, Data Anonymization.

How to Cite this Article?

Negi, P., Rajput, P., and Bisht, D. S. (2025). Enhancing Source Location Privacy in Networked Systems: A Review. International Journal of Communication and Networking System, 14(1), 46-60.

References

[2]. Camenisch, J., Fischer-Hübner, S., & Hansen, M. (2015). Privacy and Identity Management for the Future Internet in the Age of Globalisation. Springer.
[4]. Chandrakanth, P. M. (2015). Preserving source privacy and hop-by-hop message authentication in wireless sensor networks. International Journal of Engineering Research & Technology (IJERT), 3 (19), 1-6.
[5]. Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-90.
[6]. Cottrill, C. D. (2011). Location privacy: Who protects? Journal of the Urban & Regional Information Systems Association, 23(2), 49.
[7]. DeVries, W. T. (2003). Protecting privacy in the digital age. Berkeley Technology Law Journal, 18, 283.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 35
Online 15 15 200 35
Pdf & Online 35 35 400 35

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.