CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
research
Reputation aware obfuscation for mobile opportunistic networks
Authors
Abderrahim Benslimane
Derek McAuley
Milena Radenkovic
Publication date
1 January 2015
Publisher
'Institute of Electrical and Electronics Engineers (IEEE)'
Doi
Cite
Abstract
© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large number of malicious nodes and new opportunistic, adaptive. So, new, opportunistic, adaptive fully localized mechanisms are needed for improving user anonymity. This paper proposes reputation aware localized adaptive obfuscation for mobile opportunistic networks that comprises of two complementary techniques: opportunistic collaborative testing of nodes' obfuscation behaviour (OCOT) and multidimensional adaptive anonymisation (AA). OCOT-AA is driven by both explicit and implicit reputation building, complex graph connectivity analytics and obfuscation history analyses. We show that OCOT-AA is very efficient in terms of achieving high levels of node identity obfuscation and managing low delays for answering queries between sources and destinations while enabling fast detection and avoidance of malicious nodes typically within the fraction of time within the experiment duration. We perform extensive experiments to compare OCOT-AA with several other competitive and benchmark protocols and show that it outperforms them across a range of metrics over a one month real-life GPS trace. To demonstrate our proposal more clearly, we propose new metrics that include best effort biggest length and diversity of the obfuscation paths, the actual percentage of truly anonymised sources' IDs at the destinations and communication quality of service between source and destination
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
Nottingham ePrints
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:eprints.nottingham.ac.uk:3...
Last time updated on 01/08/2016
Name not available
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:eprints.nottingham.ac.uk:3...
Last time updated on 14/12/2017
Name not available
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:eprints.nottingham.ac.uk:3...
Last time updated on 14/12/2017
Repository@Nottingham
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:nottingham-repository.work...
Last time updated on 08/01/2019
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
info:doi/10.1109%2Ftpds.2013.2...
Last time updated on 26/03/2019
Nottingham eTheses
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:eprints.nottingham.ac.uk:3...
Last time updated on 01/08/2016