2012
DOI: 10.1007/s11036-012-0406-y
|View full text |Cite
|
Sign up to set email alerts
|

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks

Abstract: Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing complementary services including real-time friend and community detection and localized data sharing without infrastructure requirement. After years of research, the deployment of such peer-to-peer wireless networks is finally being considered. A fundamental… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Among them, it is a feasible and effective strategy to use pseudonyms to conceal vehicles' real identities and provide unlinkability of new and previous pseudonyms. In some schemes, [7][8][9] each vehicle needs to store a large number of anonymous certificates in advance and changes its pseudonym in fixed mix-zones which are carefully selected and are generally road intersections. These methods have to deal with storing and managing too many anonymous certificates, and the limitation that vehicles are allowed only to change pseudonyms in fixed zones make these schemes lack of necessary flexibility.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, it is a feasible and effective strategy to use pseudonyms to conceal vehicles' real identities and provide unlinkability of new and previous pseudonyms. In some schemes, [7][8][9] each vehicle needs to store a large number of anonymous certificates in advance and changes its pseudonym in fixed mix-zones which are carefully selected and are generally road intersections. These methods have to deal with storing and managing too many anonymous certificates, and the limitation that vehicles are allowed only to change pseudonyms in fixed zones make these schemes lack of necessary flexibility.…”
Section: Introductionmentioning
confidence: 99%
“…Sensor networks are the spatial distribution of large numbers of sensors with their computation and communication capabilities (Freudiger, Jadliwala, Hubaux, Niemi, & Ginzboorg, 2013). Since these nodes are deployed in various environments, including remote and dangerous environments such as volcanic regions, the major problem in WSN has become how to power a wireless transmission that requires higher power levels from limitedpower resources (Belleville, et al 2010).…”
Section: Introductionmentioning
confidence: 99%
“…Privacy of a user's location or location preferences, with relevance different users and therefore the third-party service provider, may be an essential concern in such location-sharing-based applications [2]. For instance, such information can be used to de-anonymize users and their availabilities [3], to track their preferences [4] or to identify their social networks [5]. In the taxi-sharing application, a third-party supplier could easily deduce home/work location pairs of users who regularly use their service.…”
Section: Introductionmentioning
confidence: 99%