Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorParris, Iain Siraj
dc.contributor.authorBigwood, Gregory John
dc.contributor.authorHenderson, Tristan Nicholas Hoang
dc.date.accessioned2010-10-20T10:54:15Z
dc.date.available2010-10-20T10:54:15Z
dc.date.issued2010-03
dc.identifier.citationParris , I S , Bigwood , G J & Henderson , T N H 2010 , Privacy-enhanced social network routing in opportunistic networks . in Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) : IEEE International Workshop on Security and Social Networking (SESOC 2010) . IEEE Computer Society , pp. 624-629 , 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) , Mannheim , Germany , 29/03/10 . https://doi.org/10.1109/PERCOMW.2010.5470511en
dc.identifier.citationconferenceen
dc.identifier.isbn978-1-4244-6605-4
dc.identifier.otherPURE: 3378247
dc.identifier.otherPURE UUID: 011395ea-ab2f-4eb6-b7e8-0c9ec8a39ae4
dc.identifier.otherstandrews_research_output: 32274
dc.identifier.otherScopus: 77954016786
dc.identifier.urihttp://hdl.handle.net/10023/1046
dc.description.abstractOpportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. Forwarding messages in such a network often involves the use of social network routing-sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast these social networks, which introduces privacy concerns. This paper introduces two methods for enhancing privacy in social network routing by obfuscating the social network graphs used to inform routing decisions. We evaluate these methods using two real-world datasets, and find that it is possible to obfuscate the social network information without leading to a significant decrease in routing performance.
dc.language.isoeng
dc.publisherIEEE Computer Society
dc.relation.ispartofProceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)en
dc.rights©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en
dc.subjectAd hoc networksen
dc.subjectData privacyen
dc.subjectMessage passingen
dc.subjectMobile radioen
dc.subjectSocial networkingen
dc.subjectTelecommunication securityen
dc.subjectQA76 Computer softwareen
dc.subject.lccQA76en
dc.titlePrivacy-enhanced social network routing in opportunistic networksen
dc.typeConference itemen
dc.description.versionPublisher PDFen
dc.contributor.institutionUniversity of St Andrews.School of Computer Scienceen
dc.identifier.doihttps://doi.org/10.1109/PERCOMW.2010.5470511
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=77954016786&partnerID=8YFLogxKen


This item appears in the following Collection(s)

Show simple item record