Research Article
Location Privacy Protection Scheme for LBS in IoT
Algorithm 1
Geohash code generation algorithm.
| Input: Position coordinates , code length | | Output: Geohash code (CGh) | | 1. , ; | | 2. ; //The separate code length of longitude and latitude | | 3. ; | | 4. int , ; // is the number of latitudinal dichotomies, and is the number of longitude dichotomies | | 5. , ; //Dichotomizing the latitude and the longitude | | 6. while (latmid) //Convert longitude coordinates to binary | | 7. { | | 8. char ; | | 9. if | | 10. ; | | 11. else ; | | 12. ; | | 13. } | | 14. while (lonmid) //Convert latitude coordinates to binary | | 15. { | | 16. char ; | | 17. if | | 18. ; | | 19. else ; | | 20. ; | | 21. } | | 22. while //The longitude and latitude are combined, and the even bit is used to put the longitude, and the odd bit is used to put the latitude | | 23. { | | 24. int ; | | 25. char ; | | 26. if | | 27. { | | 28. ; | | 29. ; | | 30. ; | | 31. } | | 32. else | | 33. { | | 34. ; | | 35. ; | | 36. ; | | 37. } | | 38. return ; | | 39. } | | 40. int ; | | 41. for (; ) | | 42. { | | 43. ; //Divide into groups of five digits | | 44. ; //Map binary to Base32 | | 45. ; | | 46. ; | | 47. } | | 48. return CGh; //Get Geohash code |
|