Research Article

Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

by  B. N. Jagdale, N. S. Gawande
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Issue 21
Published: November 2012
Authors: B. N. Jagdale, N. S. Gawande
10.5120/9235-3532
PDF

B. N. Jagdale, N. S. Gawande . Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications. International Journal of Computer Applications. 57, 21 (November 2012), 1-10. DOI=10.5120/9235-3532

                        @article{ 10.5120/9235-3532,
                        author  = { B. N. Jagdale,N. S. Gawande },
                        title   = { Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 57 },
                        number  = { 21 },
                        pages   = { 1-10 },
                        doi     = { 10.5120/9235-3532 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A B. N. Jagdale
                        %A N. S. Gawande
                        %T Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications%T 
                        %J International Journal of Computer Applications
                        %V 57
                        %N 21
                        %P 1-10
                        %R 10.5120/9235-3532
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now a day in fast growing world, use of internet is increasing popularly and at the same time Location-based service is also getting more popular even in ad-hoc network. Location-based service providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual by applying K- anonymization and obfuscation algorithms . This objective is achieved by simulating K- anonymization and obfuscation algorithms for Manhattan mobility model and Waypoint mobility model using NS-2. 34 environment. In the experiments, the user's current location is hide by rectangle [bounding box] according to users privacy need.

References
  • T. Hashem and L. Kulik , 2007, "Safeguarding Location Privacy in Wireless Ad-Hoc Networks" , UbiComp 2007, LNCS 4717, pp. 372–390, Springer-Verlag Berlin Heidelberg .
  • M. F. Mokbel, C. Y. Chow and W. G. Aref , 2009, "The New Casper: Query Processing for Location Services without Compromising Privacy', VLDB Endowment, ACM 159593385-9/06/09.
  • C. Y. Chow, M. F. Mokbel and T. He, 2011, "A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks", IEEE Mobile Computing, vol. 10, no. 1, pp. 1-14.
  • M. Duckham and L. Kulik, 2005, "A Formal Model of Obfuscation and Negotiation for Location Privacy", Proc. Of Pervasive Computing, 2005: pp. 152–170.
  • L. Sweeney and P. Samarati, 2002, "Protecting Privacy When Disclosing Information: k-anonymity & its enforcement through Generalization", in Proc. of MobiCom.
  • L. Sweeney, 2002, "k- Anonymity: A Model for Protecting Privacy. " International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570.
  • M. Duckham and L. Kulik, 2007, "Location Privacy & Location Aware Computing", in Proceedings of HICSS, pp. 1-7.
  • Y. Zhu and R. Bellati, 2007, "Compromising Location Privacy in WSN with limited information", Proc. of ICDCS-2007, Pages 24.
  • C. A. Ardagna, M. Cremonini, E. Damiani, S. De, C. Vimercati, and P. Samarati, 2007, "Location privacy protection through obfuscation-based techniques", Lecture Notes in Computer Science, LNCS 4602, Springer, Berlin, pp. 47–60.
  • M. Duckham and L. Kulik. , 2007, "Location Privacy & Location Aware Computing" Proceeding of HICSS, pp. 213-220.
  • R. Shokri, G. Theodorakopoulos , C. Troncoso, J. Hubaux and J. Boudec, 2012, "Protecting Location Privacy: Optimal Strategy against Localization Attacks", Proceedings of CCS'12, October 16–18, 2012, Raleigh, North Carolina, USA, pp. 1-11.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Location-based service [LBS] wireless ad-hoc networks LCA GCA

Powered by PhDFocusTM