Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Reputation aware obfuscation for mobile opportunistic networks (2013)
Journal Article
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265

© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large nu... Read More about Reputation aware obfuscation for mobile opportunistic networks.

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks (2013)
Journal Article
Zakhary, S., Radenkovic, M., & Benslimane, A. (2014). Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Transactions on Vehicular Technology, 63(2), 893-906. https://doi.org/10.1109/TVT.2013.2279671

This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportun... Read More about Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks.