메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1059-1063

Utilizing social links for location privacy in opportunistic delay-tolerant networks

Author keywords

delay tolerant network; location privacy; location based services; oppertunistic network; Security

Indexed keywords

DATA TRACES; DELAY TOLERANT NETWORKS; DISTRIBUTED PROTOCOLS; EXTENSIVE SIMULATIONS; K-ANONYMITY; LOCATION PRIVACY; MOBILITY PATTERN; PRIVACY REQUIREMENTS; SECURITY; SOCIAL NETWORKS; SOCIAL TIES; SOCIAL-BASED; SUCCESS RATIO;

EID: 84872001538     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6364413     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 2
    • 77951578596 scopus 로고    scopus 로고
    • Preserving privacy in location-based mobile social applications
    • ACM
    • Puttaswamy, K.P.N. and B.Y. Zhao, Preserving privacy in location-based mobile social applications, in HotMobile 2010, ACM. p. 1-6.
    • (2010) HotMobile , pp. 1-6
    • Puttaswamy, K.P.N.1    Zhao, B.Y.2
  • 4
    • 33947176178 scopus 로고    scopus 로고
    • Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks
    • Pelusi, L., A. Passarella, and M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 2006. 44(11): p. 134-141.
    • (2006) Communications Magazine, IEEE , vol.44 , Issue.11 , pp. 134-141
    • Pelusi, L.1    Passarella, A.2    Conti, M.3
  • 5
    • 84885799779 scopus 로고    scopus 로고
    • Pocket switched networks and human mobility in conference environments
    • ACM
    • Hui, P., et al., Pocket switched networks and human mobility in conference environments, in SIGCOMM workshop on DTN 2005, ACM.
    • (2005) SIGCOMM Workshop on DTN
    • Hui, P.1
  • 6
    • 77958084079 scopus 로고    scopus 로고
    • Security and privacy in emerging wireless networks
    • Ma, D. and G. Tsudik, Security and privacy in emerging wireless networks. Wireless Comm., 2010. 17(5): p. 12-21.
    • (2010) Wireless Comm. , vol.17 , Issue.5 , pp. 12-21
    • Ma, D.1    Tsudik, G.2
  • 7
    • 80052782346 scopus 로고    scopus 로고
    • The impact of location privacy on opportunistic networks
    • Parris, I. and T. Henderson, The impact of location privacy on opportunistic networks, in WoWMoM2011.
    • WoWMoM2011
    • Parris, I.1    Henderson, T.2
  • 8
    • 37849017498 scopus 로고    scopus 로고
    • Social network analysis for routing in disconnected delay-tolerant manets
    • ACM
    • Daly, E. and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. in MobiHoc'07. 2007. ACM.
    • (2007) MobiHoc'07
    • Daly, E.1    Haahr, M.2
  • 9
    • 34547650428 scopus 로고    scopus 로고
    • How small labels create big improvements
    • IEEE
    • Hui, P. and J. Crowcroft, How Small Labels Create Big Improvements, in PERCOMW '072007, IEEE p. 65-70.
    • PERCOMW '072007 , pp. 65-70
    • Hui, P.1    Crowcroft, J.2
  • 10
    • 74349118836 scopus 로고    scopus 로고
    • Habit: Leveraging human mobility and social network for efficient content dissemination in Delay Tolerant Networks
    • IEEE
    • Mashhadi, A., B. Mokhtar, and L. Capra. Habit: Leveraging human mobility and social network for efficient content dissemination in Delay Tolerant Networks. in WoWMoM. 2009. IEEE.
    • (2009) WoWMoM
    • Mashhadi, A.1    Mokhtar, B.2    Capra, L.3
  • 11
    • 78650896411 scopus 로고    scopus 로고
    • Moving forward: Location privacy and location awareness
    • ACM: San Jose, California
    • Duckham, M., Moving forward: location privacy and location awareness, in SPRINGL2010, ACM: San Jose, California. p. 1-3.
    • SPRINGL2010 , pp. 1-3
    • Duckham, M.1
  • 12
    • 77954016786 scopus 로고    scopus 로고
    • Privacy-enhanced social network routing in opportunistic networks
    • IEEE
    • Parris, I., G. Bigwood, and T. Henderson. Privacy-enhanced social network routing in opportunistic networks. in PERCOM Workshops. 2010. IEEE.
    • (2010) PERCOM Workshops
    • Parris, I.1    Bigwood, G.2    Henderson, T.3
  • 13
    • 77953313061 scopus 로고    scopus 로고
    • SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
    • IEEE
    • Rongxing, L., L. Xiaodong, and S. Xuemin. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. in INFOCOM. 2010. IEEE.
    • (2010) INFOCOM
    • Rongxing, L.1    Xiaodong, L.2    Xuemin, S.3
  • 14
    • 84885059952 scopus 로고    scopus 로고
    • Privacy-preserving content-based publish/subscribe networks
    • Shikfa, A., M. Önen, and R. Molva, Privacy-preserving content-based publish/subscribe networks. SEC, 2009: p. 270-282.
    • (2009) SEC , pp. 270-282
    • Shikfa, A.1    Önen, M.2    Molva, R.3
  • 15
    • 79551633017 scopus 로고    scopus 로고
    • Preventing traffic explosion and achieving source unobservability in multi-hop wireless networks using network coding
    • Yanfei, F., et al. Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding. in GLOBECOM. 2010.
    • (2010) GLOBECOM
    • Yanfei, F.1
  • 16
    • 84961358854 scopus 로고    scopus 로고
    • Towards event source unobservability with minimum network traffic in sensor networks
    • ACM
    • Yang, Y., et al. Towards event source unobservability with minimum network traffic in sensor networks. in WiSec. 2008. ACM.
    • (2008) WiSec
    • Yang, Y.1
  • 17
    • 79960880538 scopus 로고    scopus 로고
    • Maintaining source privacy under eavesdropping and node compromise attacks
    • IEEE
    • Pongaliur, K. and L. Xiao, Maintaining Source Privacy under Eavesdropping and Node Compromise Attacks, in INFOCOM2011: IEEE.
    • INFOCOM2011
    • Pongaliur, K.1    Xiao, L.2
  • 19
    • 84885775524 scopus 로고    scopus 로고
    • Spray and wait: An efficient routing scheme for intermittently connected mobile networks
    • ACM
    • Spyropoulos, T., K. Psounis, and C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in SIGCOMM workshop on DTN.2005, ACM.
    • (2005) SIGCOMM Workshop on DTN
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 20
    • 84866901335 scopus 로고    scopus 로고
    • Writing on the clean slate: Implementing a socially-aware protocol in Haggle
    • IEEE
    • Musolesi, M., et al., Writing on the clean slate: Implementing a socially-aware protocol in Haggle, in WoWMoM 2008, IEEE. p. 1-6.
    • (2008) WoWMoM , pp. 1-6
    • Musolesi, M.1
  • 21
    • 78650880242 scopus 로고    scopus 로고
    • Anonymizing user location and profile information for privacy-aware mobile services
    • ACM
    • Mano, M. and Y. Ishikawa, Anonymizing user location and profile information for privacy-aware mobile services, in LBSN2010, ACM. p. 68-75.
    • LBSN2010 , pp. 68-75
    • Mano, M.1    Ishikawa, Y.2
  • 22
    • 84922954336 scopus 로고    scopus 로고
    • The ONE simulator for DTN protocol evaluation
    • ICST
    • Keränen, A., J. Ott, and T. Kärkkäinen. The ONE Simulator for DTN Protocol Evaluation. in SIMUTools. 2009. ICST.
    • (2009) SIMUTools
    • Keränen, A.1    Ott, J.2    Kärkkäinen, T.3
  • 23
    • 44049092178 scopus 로고    scopus 로고
    • Sofia: Social filtering for robust recommendations
    • Dell'Amico, M. and L. Capra, Sofia: Social filtering for robust recommendations. Trust Management II, 2008: p. 135-150.
    • (2008) Trust Management II , pp. 135-150
    • Dell'Amico, M.1    Capra, L.2
  • 24
    • 56749091843 scopus 로고    scopus 로고
    • Exploiting self-reported social networks for routing in ubiquitous computing environments
    • Bigwood, G., et al., Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments, in WIMOB 2008.
    • (2008) WIMOB
    • Bigwood, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.