2012
DOI: 10.1007/978-3-642-33167-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks

Abstract: Abstract. This paper introduces a privacy-aware geographic routing protocol for Human Movement Networks (HumaNets). HumaNets are fully decentralized opportunistic and delay-tolerate networks composed of smartphone devices. Such networks allow participants to exchange messages phone-to-phone and have applications where traditional infrastructure is unavailable (e.g., during a disaster) and in totalitarian states where cellular network monitoring and censorship are employed. Our protocol leverages self-determine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Another related system is HumaNets [2], a routing protocol for decentralized delay-tolerant networks that exploits recur ring mobility patterns to improve performance. HumaNets does not impose such a strict restriction on links as aDTN does, since its protection goal is limited to location privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Another related system is HumaNets [2], a routing protocol for decentralized delay-tolerant networks that exploits recur ring mobility patterns to improve performance. HumaNets does not impose such a strict restriction on links as aDTN does, since its protection goal is limited to location privacy.…”
Section: Related Workmentioning
confidence: 99%
“…A message should be delivered to those hubs that are visited most by a destination in order to increase delivery probability, hence a user visiting the target or nearby hubs becomes a good candidate for carrying the message. Aviv et al in [2] proposed to divide the networked area into an equal sized grid, and every user to maintain two mobility profiles: one for its own mobility, and the other for an aggregated mobility profile of all network users. After blindly receiving a message, a user finds its suitability of becoming a good candidate to carry the message to the destination grid by comparing the two mobility profiles; if found not suitable, the message is then dropped from the buffer without informing the sender, hence, maintaining a level of security.…”
Section: Related Workmentioning
confidence: 99%
“…The study shows that the the proposed protocol achieves better delivery ratio and reduces communication cost in terms of message path length. Although our protocol shares the Geo-Casting routing with the works presented in [5,2,14], we show how LoSeRo includes a novel and efficient routing protocol based only on the users' most frequented places, and how LoSeRo achieves a very high coverage, precision trade-off.…”
Section: Related Workmentioning
confidence: 99%
“…There are patterns that tend to be regular since people repeatedly visit the same places over and over again (Aviv et al, 2010). These patterns can become chaotic in the sense that an act of randomness can alter the regular pattern, causing a given person to contact different people over a specific time or visit different places (Aviv et al, 2010). The patterns that tend to be regular are divided into three periods of mobility: no mobility, low mobility and high mobility.…”
Section: Requirements For a Physical Bluetooth Candc Channelmentioning
confidence: 99%
“…Human mobility patterns tend to have two useful properties: regularity and chaotic (Aviv et al, 2010). There are patterns that tend to be regular since people repeatedly visit the same places over and over again (Aviv et al, 2010).…”
Section: Requirements For a Physical Bluetooth Candc Channelmentioning
confidence: 99%