Opportunistic networks are an enabler technology for typologies without centralized infrastructure. Portable devices, such as wearable and embedded mobile systems, send relay messages to the communication range devices. One of the most critical challenges is to find the optimal route in these networks while at the same time preserving privacy for the participants of the network. Addressing this challenge, we presented a novel routing algorithm based on device clusters, reducing the overall message load and increasing network performance. At the same time, possibly identifying information of network nodes is eliminated by cloaking to meet privacy requirements. We evaluated our routing algorithm in terms of efficiency and privacy in opportuni...
Anonymity and location privacy are two important aspects of network security for users. This thesis ...
We present a new approach for opportunistic information dissemination. In contrast to prior approach...
The last 10 years of Internet development have been dominated by the growing popularity of cloud com...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
Abstract-Opportunistic networking- forwarding messages in a disconnected mobile ad hoc network via a...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
This paper focuses on the problem of providing anonymous communications in opportunistic networks. T...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
With the diffusion of the Internet of Things (IoT), computing is becoming increasingly pervasive, an...
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays,...
The overarching goal of my research is to design protocols for efficient communication in delay tole...
none3siWith the diffusion of the Internet of Things (IoT), computing is becoming increasingly pervas...
In recent years, networked devices spread into different activities in our daily lives enabling many...
Anonymity and location privacy are two important aspects of network security for users. This thesis ...
We present a new approach for opportunistic information dissemination. In contrast to prior approach...
The last 10 years of Internet development have been dominated by the growing popularity of cloud com...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
Abstract-Opportunistic networking- forwarding messages in a disconnected mobile ad hoc network via a...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
This paper focuses on the problem of providing anonymous communications in opportunistic networks. T...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
With the diffusion of the Internet of Things (IoT), computing is becoming increasingly pervasive, an...
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays,...
The overarching goal of my research is to design protocols for efficient communication in delay tole...
none3siWith the diffusion of the Internet of Things (IoT), computing is becoming increasingly pervas...
In recent years, networked devices spread into different activities in our daily lives enabling many...
Anonymity and location privacy are two important aspects of network security for users. This thesis ...
We present a new approach for opportunistic information dissemination. In contrast to prior approach...
The last 10 years of Internet development have been dominated by the growing popularity of cloud com...