Files in this item
Privacy-enhanced social network routing in opportunistic networks
Item metadata
dc.contributor.author | Parris, Iain Siraj | |
dc.contributor.author | Bigwood, Gregory John | |
dc.contributor.author | Henderson, Tristan Nicholas Hoang | |
dc.date.accessioned | 2010-10-20T10:54:15Z | |
dc.date.available | 2010-10-20T10:54:15Z | |
dc.date.issued | 2010-03 | |
dc.identifier.citation | Parris , I S , Bigwood , G J & Henderson , T N H 2010 , Privacy-enhanced social network routing in opportunistic networks . in Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) : IEEE International Workshop on Security and Social Networking (SESOC 2010) . IEEE Computer Society , pp. 624-629 , 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) , Mannheim , Germany , 29/03/10 . https://doi.org/10.1109/PERCOMW.2010.5470511 | en |
dc.identifier.citation | conference | en |
dc.identifier.isbn | 978-1-4244-6605-4 | |
dc.identifier.other | PURE: 3378247 | |
dc.identifier.other | PURE UUID: 011395ea-ab2f-4eb6-b7e8-0c9ec8a39ae4 | |
dc.identifier.other | standrews_research_output: 32274 | |
dc.identifier.other | Scopus: 77954016786 | |
dc.identifier.uri | https://hdl.handle.net/10023/1046 | |
dc.description.abstract | Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. Forwarding messages in such a network often involves the use of social network routing-sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast these social networks, which introduces privacy concerns. This paper introduces two methods for enhancing privacy in social network routing by obfuscating the social network graphs used to inform routing decisions. We evaluate these methods using two real-world datasets, and find that it is possible to obfuscate the social network information without leading to a significant decrease in routing performance. | |
dc.language.iso | eng | |
dc.publisher | IEEE Computer Society | |
dc.relation.ispartof | Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) | en |
dc.rights | ©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | en |
dc.subject | Ad hoc networks | en |
dc.subject | Data privacy | en |
dc.subject | Message passing | en |
dc.subject | Mobile radio | en |
dc.subject | Social networking | en |
dc.subject | Telecommunication security | en |
dc.subject | QA76 Computer software | en |
dc.subject.lcc | QA76 | en |
dc.title | Privacy-enhanced social network routing in opportunistic networks | en |
dc.type | Conference item | en |
dc.description.version | Publisher PDF | en |
dc.contributor.institution | University of St Andrews. School of Computer Science | en |
dc.identifier.doi | https://doi.org/10.1109/PERCOMW.2010.5470511 | |
dc.identifier.url | http://www.scopus.com/inward/record.url?scp=77954016786&partnerID=8YFLogxK | en |
This item appears in the following Collection(s)
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.