Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Safeguarding Location Privacy in Wireless Ad-Hoc Networks

Identifieur interne : 003038 ( Istex/Curation ); précédent : 003037; suivant : 003039

Safeguarding Location Privacy in Wireless Ad-Hoc Networks

Auteurs : Tanzima Hashem [Australie] ; Lars Kulik [Australie]

Source :

RBID : ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005

Abstract

Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.

Url:
DOI: 10.1007/978-3-540-74853-3_22

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<author>
<name sortKey="Hashem, Tanzima" sort="Hashem, Tanzima" uniqKey="Hashem T" first="Tanzima" last="Hashem">Tanzima Hashem</name>
<affiliation wicri:level="1">
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: thashem@csse.unimelb.edu.au</mods:affiliation>
<country wicri:rule="url">Australie</country>
</affiliation>
</author>
<author>
<name sortKey="Kulik, Lars" sort="Kulik, Lars" uniqKey="Kulik L" first="Lars" last="Kulik">Lars Kulik</name>
<affiliation wicri:level="1">
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: lars@csse.unimelb.edu.au</mods:affiliation>
<country wicri:rule="url">Australie</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-74853-3_22</idno>
<idno type="url">https://api.istex.fr/document/1D94B713E6BE61C9192732B1117AE302C83FB005/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003038</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003038</idno>
<idno type="wicri:Area/Istex/Curation">003038</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Safeguarding Location Privacy in Wireless Ad-Hoc Networks</title>
<author>
<name sortKey="Hashem, Tanzima" sort="Hashem, Tanzima" uniqKey="Hashem T" first="Tanzima" last="Hashem">Tanzima Hashem</name>
<affiliation wicri:level="1">
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: thashem@csse.unimelb.edu.au</mods:affiliation>
<country wicri:rule="url">Australie</country>
</affiliation>
</author>
<author>
<name sortKey="Kulik, Lars" sort="Kulik, Lars" uniqKey="Kulik L" first="Lars" last="Kulik">Lars Kulik</name>
<affiliation wicri:level="1">
<mods:affiliation>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010, Australia</mods:affiliation>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National ICT Australia, Department of Computer Science and Software Engineering, University of Melbourne, Victoria, 3010</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: lars@csse.unimelb.edu.au</mods:affiliation>
<country wicri:rule="url">Australie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">1D94B713E6BE61C9192732B1117AE302C83FB005</idno>
<idno type="DOI">10.1007/978-3-540-74853-3_22</idno>
<idno type="ChapterID">22</idno>
<idno type="ChapterID">Chap22</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user’s identity and position. Local ad-hoc networks enable us to separate an agent’s request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k − 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003038 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd -nk 003038 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Istex
   |étape=   Curation
   |type=    RBID
   |clé=     ISTEX:1D94B713E6BE61C9192732B1117AE302C83FB005
   |texte=   Safeguarding Location Privacy in Wireless Ad-Hoc Networks
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024