Simulation-based analysis of threats to location privacy in fog computing | IEEE Conference Publication | IEEE Xplore