This paper focuses on the problem of providing anonymous communications in opportunistic networks. To that end, we propose an approach using Mix networks that enables a relatively simple solution. Opportunistic networks present some constraints that make the deployment of typical network anonymity solutions difficult or infeasible. We show, utilizing simulations on the basis of real mobility traces, that the proposed solution is feasible for some scenarios by introducing a tolerable penalty in terms of message delay and delivery. To investigate the impact of routing strategies, we offer two different methods to select Mix nodes. From the experiment results, we show the trade-off between network performance and security
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Communication privacy and latency perceived by users have become great concerns for delay-sensitive ...
This paper focuses on the problem of providing anonymous communications in opportunistic networks. T...
Abstract:Traditionally, encryption has played an important role in network security. However, it is ...
Private messaging has seen widespread interest in the recent years. While end-to-end encryption is w...
There are different methods to build an anonymity service using MIXes. A substantial decision for d...
Designing mix-networks for low-latency applications that offer acceptable performance and provide go...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract—We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communicati...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Privacy has been found to be the major impediment and hence the area to be worked out for the provis...
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. ...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Communication privacy and latency perceived by users have become great concerns for delay-sensitive ...
This paper focuses on the problem of providing anonymous communications in opportunistic networks. T...
Abstract:Traditionally, encryption has played an important role in network security. However, it is ...
Private messaging has seen widespread interest in the recent years. While end-to-end encryption is w...
There are different methods to build an anonymity service using MIXes. A substantial decision for d...
Designing mix-networks for low-latency applications that offer acceptable performance and provide go...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract—We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communicati...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Privacy has been found to be the major impediment and hence the area to be worked out for the provis...
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. ...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Communication privacy and latency perceived by users have become great concerns for delay-sensitive ...