2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364413
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing social links for location privacy in opportunistic delay-tolerant networks

Abstract: This paper is concerned with improving locationprivacy for users accessing location-based services in opportunistic DTNs. We design a protocol that offers location privacy through request/reply location obfuscation technique that uses the nodes' own social network to drive the forwarding heuristic. We propose a fully distributed socialbased location privacy protocol (SLPD) that utilizes social ties between nodes to ensure K-Anonymity, i.e. the requesting node's locations cannot be determined from at least k-1 … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Due to the recent wide penetration of mobile devices in everyday's life activities, there has been an intense research on how to design data dissemination protocols within mobile social opportunistic networks [1,2,3,4,12,17,18]. These protocols are typically based on the assumption that encounters between mobile devices are more likely to occur between people in the same social network than between random strangers -i.e.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the recent wide penetration of mobile devices in everyday's life activities, there has been an intense research on how to design data dissemination protocols within mobile social opportunistic networks [1,2,3,4,12,17,18]. These protocols are typically based on the assumption that encounters between mobile devices are more likely to occur between people in the same social network than between random strangers -i.e.…”
Section: Introductionmentioning
confidence: 99%
“…FindU [14] leverages secure multi-party communication to enable a user to find the best match user with limited information exchange. Liang et al [16] further propose a serial of profile matching algorithms with full anonymity. The work in [17] lets each node continually change its pseudonym to protect its privacy in MOSNs.…”
Section: Related Work a Privacy Protection In Mosnmentioning
confidence: 99%
“…Anonymizing node interests or attributes for privacy protection in MOSNs has been studied [10] - [13] and [14] - [17]. which uses the solution for "the millionaire's problem" to blindly check whether two nodes have similar interests.…”
Section: Related Work a Privacy Protection In Mosnmentioning
confidence: 99%
See 1 more Smart Citation
“…Zakhary and Radenkovic [60] presented a location privacy protocol that is based on the utilization of social information of nodes. In this protocol, each node maintains a social profile, which includes n profile attributes.…”
Section: Location Privacymentioning
confidence: 99%