Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
نویسندگان
چکیده
This paper introduces a novel privacy-aware geographic routing protocol for Human Movement Networks (HumaNets). HumaNets are fully decentralized opportunistic store-and-forward, delay-tolerate networks composed of smartphone devices. Such networks allow participants to exchange messages phone-to-phone and have applications where traditional infrastructure is unavailable (e.g., during a disaster) and in totalitarian states where cellular network monitoring and censorship are employed. Our protocol leverages self-determined location profiles of smartphone operators’ movements as a predictor of future locations, enabling efficient geographic routing over metropolitan-wide areas. Since these profiles contain sensitive information about participants’ prior movements, our routing protocol is designed to minimize the exposure of sensitive information during a message exchange. We demonstrate via simulation over both synthetic and real-world trace data that our protocol is highly scalable, leaks little information, and balances privacy and efficiency: messages are 30% more likely to be delivered than similar random walk protocols, and the median latency is only 23-28% greater than epidemic protocols while requiring an order of magnitude fewer messages.
منابع مشابه
Moving Targets: Geographically Routed Human Movement Networks
We introduce a new communication paradigm, Human-to-human Mobile Ad hoc Networking (HuManet), that exploits smartphone capabilities and human behavior to create decentralized networks for smartphoneto-smartphone message delivery. HuManets support stealth command-and-control messaging for mobile BotNets, covert channels in the presence of an observer who monitors all cellular communication, and ...
متن کاملEnergy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks
Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...
متن کاملExamining the Role of Virtual Social Networks in Scientific Exchanges of Librarians at Public Universities in Tehran
Background and Aim: According to the social media development in libraries and necessity of social media literacy for librarians, the aim of this study was to elucidate the viewpoints and experiences of librarians about social media literacy. Also, strategies for increasing librarians' social media literacy was suggested. Method: A qualitative study with University librarians in Sistan district...
متن کاملPrivacy-aware routing in sensor networks
A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is periodically sent back to the sink. Many times, the object needs to be protected for security reasons. However, an adversary can detect message flows and trace the message back to its source by moving in the reverse direction of the flows. This paper aims ...
متن کاملSource-Location Privacy Protection in Wireless Sensor Networks using AZR Routing
In environments where sensor networks are deployed to monitor certain events or sensitive objects, attackers may deduce the approximated location of monitored objects by hop-by-hop backtracking the traffic. This paper proposes a routing technique to provide adequate source-location privacy with balanced energy consumption, the Phantom Routing based on Annular Zone (AZR). With this technique, th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012