Radenkovic, Milena and Vaghi, Ivan and Zakhary, Sameh and Benslimane, Abderrahim (2013) AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks. In: 2013 IEEE International Conference on Communications
نویسندگان
چکیده
Social routing protocols are typically used to transfer messages among users and services in mobile opportunistic networks. Adaptive mechanisms are needed for achieving user anonymization and providing sufficient level of user anonymity due to the constant changes in underlying topology, mobility patterns and density of users and their queries. This paper describes a novel flexible and adaptive approach, AdaptAnon that is suitable for dynamic and heterogeneous mobile opportunistic networks. Our approach is multidimensional and combines multiple heuristics based on user profiles, analysis of user connectivity and history of anonymization in order to predict and decide on the best set of nodes that anonymize the sending node. Our results of extensive experiments show that AdaptAnon achieves higher quality of anonymization in terms of both the number of nodes and the diversity of nodes in the anonymization layer for varying query intensity and over different sender and destination degrees of connectivity while neither decreasing success ratios nor increasing latency. We show that AdaptAnon outperforms state of the art single dimensional anonymization approaches when run over three different real-life traces. Keywords-Mobile social networks; Anonymity; Adaptive networks
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملWelcome message from the WoWMoM 2013 General Chair
On behalf of the entire WoWMoM 2013 Organizing Committee, I welcome you to Madrid, Spain where the Fourteenth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2013) meets from the 4 to 7 of June 2013! IEEE WoWMoM 2013 begins with a day of 8 workshops AOC, CONWIRE, CORAL, D-SPAN, HOTMESH, IoT-SoS, SCUCA, and VIDEV that deal with a broad range of ho...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملImproving QoS in VANETs: A Survey
The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...
متن کاملGuest Editorial: Special Issue "SM 85-Wireless and Mobile Computing, Networking and Communications"
This special issue of the MONET journal presents the state of the art research results on the recent advances in Wireless and Mobile Communications. The special issue is dedicated to selected papers from the fourth IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008) held in Avignon, France, on October 12–14, 2008. A total of 19 papers have ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017