Dr MILENA RADENKOVIC milena.radenkovic@nottingham.ac.uk
ASSISTANT PROFESSOR
Reputation aware obfuscation for mobile opportunistic networks
Radenkovic, Milena; Benslimane, Abderrahim; McAuley, Derek
Authors
Abderrahim Benslimane
Derek McAuley
Abstract
© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large number of malicious nodes and new opportunistic, adaptive. So, new, opportunistic, adaptive fully localized mechanisms are needed for improving user anonymity. This paper proposes reputation aware localized adaptive obfuscation for mobile opportunistic networks that comprises of two complementary techniques: opportunistic collaborative testing of nodes' obfuscation behaviour (OCOT) and multidimensional adaptive anonymisation (AA). OCOT-AA is driven by both explicit and implicit reputation building, complex graph connectivity analytics and obfuscation history analyses. We show that OCOT-AA is very efficient in terms of achieving high levels of node identity obfuscation and managing low delays for answering queries between sources and destinations while enabling fast detection and avoidance of malicious nodes typically within the fraction of time within the experiment duration. We perform extensive experiments to compare OCOT-AA with several other competitive and benchmark protocols and show that it outperforms them across a range of metrics over a one month real-life GPS trace. To demonstrate our proposal more clearly, we propose new metrics that include best effort biggest length and diversity of the obfuscation paths, the actual percentage of truly anonymised sources' IDs at the destinations and communication quality of service between source and destination.
Citation
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 4, 2013 |
Online Publication Date | Oct 17, 2013 |
Publication Date | 2015-01 |
Deposit Date | Jun 14, 2016 |
Publicly Available Date | Jun 14, 2016 |
Journal | IEEE Transactions on Parallel and Distributed Systems |
Print ISSN | 1045-9219 |
Electronic ISSN | 1558-2183 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 26 |
Issue | 1 |
Pages | 230-240 |
DOI | https://doi.org/10.1109/TPDS.2013.265 |
Keywords | Mobile communication systems, privacy |
Public URL | https://nottingham-repository.worktribe.com/output/742262 |
Publisher URL | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6636891 |
Additional Information | (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Contract Date | Jun 14, 2016 |
Files
TPDS.pdf
(699 Kb)
PDF
You might also like
ARU2-Net: A Deep Learning Approach for Global-Scale Oceanic Eddy Detection
(2024)
Journal Article
Global oceanic mesoscale eddies trajectories prediction with knowledge-fused neural network
(2024)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search