Efficient location privacy-aware forwarding in opportunistic mobile networks
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportunistic mobile networks (OppMNets. We utilize a ligh...
| Main Authors: | Zakhary, Sameh, Radenkovic, Milena, Benslimane, Abderrahim |
|---|---|
| Format: | Article |
| Published: |
Institute of Electrical and Electronics Engineers
2014
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/33930/ |
Similar Items
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems
by: Radenkovic, Milena, et al.
Published: (2016)
by: Radenkovic, Milena, et al.
Published: (2016)
Increasing communication reliability in manufacturing environments
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
by: Waheed, Bassam M.S.
Published: (2014)
by: Waheed, Bassam M.S.
Published: (2014)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
Performance evaluation of manet in presence of black hole nodes
by: Dhahir, Saif Mahmood
Published: (2017)
by: Dhahir, Saif Mahmood
Published: (2017)
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
by: Ejmaa, Ali Mohamed E.
Published: (2017)
by: Ejmaa, Ali Mohamed E.
Published: (2017)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2013)
by: Radenkovic, Milena, et al.
Published: (2013)
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
by: Zarafshan, Faraneh
Published: (2015)
by: Zarafshan, Faraneh
Published: (2015)
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
The privacy concerns in location based services: protection approaches and remaining challenges
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
Channel congestion control mechanisms for IEEE 802.11P/1609.4 in vehicular ad-hoc networks
by: Al-Zaghir, Akram Abdullah
Published: (2019)
by: Al-Zaghir, Akram Abdullah
Published: (2019)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
The role of wireless sensor networks (WSNs) in industrial oil and gas condition monitoring
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
Gaming experience on the mobiTop system: a collocated ad-hoc collaboration system
by: Teo, Rhun Ming, et al.
Published: (2016)
by: Teo, Rhun Ming, et al.
Published: (2016)
Indoor location based services challenges, requirements and usability of current solutions
by: Basiri, Anahid, et al.
Published: (2017)
by: Basiri, Anahid, et al.
Published: (2017)
Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
by: Wietrzyk, Bartosz, et al.
Published: (2007)
by: Wietrzyk, Bartosz, et al.
Published: (2007)
An adaptive energy efficient protocol in media access control
by: Abduljaleel, Uday, et al.
Published: (2009)
by: Abduljaleel, Uday, et al.
Published: (2009)
Architecture and performance of multi-hop wireless ad-hoc routing protocol (MultiWARP)
by: Van Der Werf, Steven Martijn
Published: (2010)
by: Van Der Werf, Steven Martijn
Published: (2010)
Congestion aware forwarding in delay tolerant and social opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2011)
by: Radenkovic, Milena, et al.
Published: (2011)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Understanding complementary multi-layer collaborative heuristics for adaptive caching in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Understanding complementary multi-layer collaborative heuristics for adaptive caching in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Seeking Transparency in Locative Media
by: Leaver, Tama, et al.
Published: (2015)
by: Leaver, Tama, et al.
Published: (2015)
Multilayer content services in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha
Published: (2021)
by: Huynh, Vu San Ha
Published: (2021)
Cooperative Power Scheduling for a Network of MIMO Links
by: Dong, X., et al.
Published: (2010)
by: Dong, X., et al.
Published: (2010)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Collaborative cognitive content dissemination and query in heterogeneous mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2017)
by: Radenkovic, Milena, et al.
Published: (2017)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Learning from the experts: enabling and studying DIY development of location-based visitor experiences
by: Bedwell, Benjamin D., et al.
Published: (2015)
by: Bedwell, Benjamin D., et al.
Published: (2015)
Predicting future location in mobile cache based on variable order of prediction-by-partial-matching algorithm
by: Li, Lincan, et al.
Published: (2018)
by: Li, Lincan, et al.
Published: (2018)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
The non-technical challenges of Location Based Services markets: are the users' concerns being ignored?
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network
by: Farzan, Payam
Published: (2014)
by: Farzan, Payam
Published: (2014)
Similar Items
-
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015) -
Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems
by: Radenkovic, Milena, et al.
Published: (2016) -
Increasing communication reliability in manufacturing environments
by: Radenkovic, Milena, et al.
Published: (2015) -
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018) -
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)