Private mobility-cast for opportunistic networks
نویسندگان
چکیده
In this paper, we introduce the notion of mobility-cast in opportunistic networks, according to which a message sent by a user S is delivered to users with a mobility pattern similar to that of S – collectively named place-friends . Motivation for delivering a message to place-friends stems from the fact that current social acquaintances are likely to be place-friends. Most importantly, it has been recently found that a large fraction of new social contacts come from place-friends. After introducing mobility-cast, we present a privacy-preserving mobile-cast protocol based on secure two-party computation. The effectiveness of the protocol in delivering messages to place-friends is demonstrated by means of analysis and extensive simulations based on a realistic mobility model. In the last part of the paper, we present two alternative implementations of mobility-cast on the Android platform, and test their computational performance on a number of different smartphones. Overall, the results presented in this paper show that privacy-preserving mobility-cast can be effectively implemented with current mobile phone technology. © 2017 Published by Elsevier B.V.
منابع مشابه
Improving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways
Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...
متن کاملEfficient Routing Protocol for Highly Dynamic Mobile Ad Hoc Networks
Data delivery of packets in broad cast using wireless medium is the main intention of this paper, this will be done through a MANETS and should achieve reliable delivery. To do this various protocols are available in the networks world with in that efficient protocol called Position based opportunistic routing protocol which holds stateless property of geographic routing. When a data packet is ...
متن کاملUsers Mobility Models for Opportunistic Networks: the Role of Physical Locations
Opportunistic networks are pervasive networks built exclusively by users’ devices. With respect to legacy multi-hop ad hoc networks (MANETs), opportunistic networks are much more resilient to disconnections, long network partitions, and dynamic reconfigurations. Therefore, they are suitable for challenged scenarios, such as disaster areas, or rural environments. While in MANET nodes’ mobility i...
متن کاملOpportunistic Neighbour Prediction Using an Artificial Neural Network
Device mobility is an issue that affects both MANETs and opportunistic networks. While the former employs conventional routing techniques with some element of mobility management, opportunistic networking protocols often use mobility as a means of delivering messages in intermittently connected networks. If nodes are able to determine the future locations of other nodes with reasonable accuracy...
متن کاملIdentifying Influential Nodes for Efficient Routing in Opportunistic Networks
—Opportunistic networks exploit human mobility and consequent device-to-device contacts to opportunistically create data paths over time. Identifying influential nodes as relay is a crucial problem for efficient routing in opportunistic networks. The degree centrality method is very simple but of little relevance. Although closeness centrality and betweenness centrality can effectively identif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 120 شماره
صفحات -
تاریخ انتشار 2017