Opportunistic networking—forwarding messages in a disconnected mobile ad hoc network via any encountered nodes — offers a new mechanism for exploiting the mobile devices that many users now carry. Forwarding messages in such a network often involves the use of social-network routing— sending messages via nodes in the sender or recipient’s friends list. Simple social-network routing, however, may broadcast these friends lists, which introduces privacy concerns.This paper presents a threat analysis of the privacy risks in social-network routing. We introduce two complementary methods for enhancing privacy in social-network routing by obfuscating the friends lists used to inform routing decisions. We evaluate these methods using three real-wor...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to ...
In opportunistic networks, the nodes usually exploit a con-tact opportunity to perform hop-by-hop ro...
When the connection to Internet is not available during networking activities, an opportunistic appr...
Abstract-Opportunistic networking- forwarding messages in a disconnected mobile ad hoc network via a...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Abstract — Privacy in mobile ad hoc networks has new semantics in addition to the conventional notio...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
Abstract—We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to ...
In opportunistic networks, the nodes usually exploit a con-tact opportunity to perform hop-by-hop ro...
When the connection to Internet is not available during networking activities, an opportunistic appr...
Abstract-Opportunistic networking- forwarding messages in a disconnected mobile ad hoc network via a...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encount...
When in physical proximity, data can be directly exchanged between the mobile devices people carry -...
Abstract — Privacy in mobile ad hoc networks has new semantics in addition to the conventional notio...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Opportunistic networking involves forwarding messages between proximate users, who may or may not kn...
Abstract—We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Opportunistic networks have been the study of much research — in particular on making end-to-end rou...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to ...
In opportunistic networks, the nodes usually exploit a con-tact opportunity to perform hop-by-hop ro...
When the connection to Internet is not available during networking activities, an opportunistic appr...