2015
DOI: 10.1109/tpds.2013.265
|View full text |Cite
|
Sign up to set email alerts
|

Reputation Aware Obfuscation for Mobile Opportunistic Networks

Abstract: Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large number of malicious nodes and new opportunistic, adaptive. So, new, opportunistic, adaptive fully localized mechanisms are needed for improving user anonymity. This paper proposes reputation aware localized adaptive obfuscation for mobile opportunistic networks that comprises of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Today, resource constraints of wearables in terms of their energy (battery lifetime limitations), bandwidth (link capacity and data transmission latency), and computation (sensing and processing costs) constitute the major user adoption barriers. Further, wearables are person-centric in the sense that they collect and communicate information only about their specific wearer, which may raise privacy concerns that need to be addressed with e.g., adaptive obfuscation mechanisms [5]. Finally, small numbers of involved participants may compromise the efficiency of a crowd sensing service and thus scalable solutions are needed for incentivizing user involvement into data sharing.…”
Section: B Urban Crowd Sensing Over Wearablesmentioning
confidence: 99%
“…Today, resource constraints of wearables in terms of their energy (battery lifetime limitations), bandwidth (link capacity and data transmission latency), and computation (sensing and processing costs) constitute the major user adoption barriers. Further, wearables are person-centric in the sense that they collect and communicate information only about their specific wearer, which may raise privacy concerns that need to be addressed with e.g., adaptive obfuscation mechanisms [5]. Finally, small numbers of involved participants may compromise the efficiency of a crowd sensing service and thus scalable solutions are needed for incentivizing user involvement into data sharing.…”
Section: B Urban Crowd Sensing Over Wearablesmentioning
confidence: 99%
“…Mechanism Our distributed reputation aware mechanism built within information-centric layer of CafRepCache integrates four main features: centrality, credit-based feedback, reputation discounting and secondary response (as in line with [1,2,18]) to weigh the value of exchanged content popularities among ego network nodes in order to improve the collaborative caching decisions in highly mobile and disconnection-prone scenarios. Fig.…”
Section: B Reputation-based Content Popularity Weightingmentioning
confidence: 99%
“…Assuming that take social metrics as the first reputation into account for every node, the aggregated content popularity of the content observed from all the neighbours of is now rewritten as: Then, we base on our previous work [1,3,18] to propose credit-based feedback algorithm in order to evaluate the accuracy and usefulness the content popularity value reported from a node in ego networks to a caching point.…”
Section: 3mentioning
confidence: 99%
See 1 more Smart Citation
“…To mitigate the impact of resource-related attacks by biased, selfish, and malicious nodes we propose a novel, distributed, decentralised, adaptive, collaborative, scalable framework for Trust-Aware Communications in Disaster -TACID. Our framework builds upon lessons learned from AdaptAnon [19] and OCOT-AA [20] and uses localised, predictive, real-time analytics derived from collaborative multidimensional multi-natured complex temporal graphs. TACID is a peer to peer, reputation and trust-aware approach for reliable and secure dissemination of sensitive resource-related communications amongst heterogeneous user groups in highly challenging, large-scale, distributed, delay and disconnection prone environments with hostile nodes present.…”
Section: Introductionmentioning
confidence: 99%