CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

by B. N. Jagdale, N. S. Gawande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 21
Year of Publication: 2012
Authors: B. N. Jagdale, N. S. Gawande
10.5120/9235-3532

B. N. Jagdale, N. S. Gawande . Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications. International Journal of Computer Applications. 57, 21 ( November 2012), 1-10. DOI=10.5120/9235-3532

@article{ 10.5120/9235-3532,
author = { B. N. Jagdale, N. S. Gawande },
title = { Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 21 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number21/9235-3532/ },
doi = { 10.5120/9235-3532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:02.248311+05:30
%A B. N. Jagdale
%A N. S. Gawande
%T Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 21
%P 1-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now a day in fast growing world, use of internet is increasing popularly and at the same time Location-based service is also getting more popular even in ad-hoc network. Location-based service providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual by applying K- anonymization and obfuscation algorithms . This objective is achieved by simulating K- anonymization and obfuscation algorithms for Manhattan mobility model and Waypoint mobility model using NS-2. 34 environment. In the experiments, the user's current location is hide by rectangle [bounding box] according to users privacy need.

References
  1. T. Hashem and L. Kulik , 2007, "Safeguarding Location Privacy in Wireless Ad-Hoc Networks" , UbiComp 2007, LNCS 4717, pp. 372–390, Springer-Verlag Berlin Heidelberg .
  2. M. F. Mokbel, C. Y. Chow and W. G. Aref , 2009, "The New Casper: Query Processing for Location Services without Compromising Privacy', VLDB Endowment, ACM 159593385-9/06/09.
  3. C. Y. Chow, M. F. Mokbel and T. He, 2011, "A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks", IEEE Mobile Computing, vol. 10, no. 1, pp. 1-14.
  4. M. Duckham and L. Kulik, 2005, "A Formal Model of Obfuscation and Negotiation for Location Privacy", Proc. Of Pervasive Computing, 2005: pp. 152–170.
  5. L. Sweeney and P. Samarati, 2002, "Protecting Privacy When Disclosing Information: k-anonymity & its enforcement through Generalization", in Proc. of MobiCom.
  6. L. Sweeney, 2002, "k- Anonymity: A Model for Protecting Privacy. " International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570.
  7. M. Duckham and L. Kulik, 2007, "Location Privacy & Location Aware Computing", in Proceedings of HICSS, pp. 1-7.
  8. Y. Zhu and R. Bellati, 2007, "Compromising Location Privacy in WSN with limited information", Proc. of ICDCS-2007, Pages 24.
  9. C. A. Ardagna, M. Cremonini, E. Damiani, S. De, C. Vimercati, and P. Samarati, 2007, "Location privacy protection through obfuscation-based techniques", Lecture Notes in Computer Science, LNCS 4602, Springer, Berlin, pp. 47–60.
  10. M. Duckham and L. Kulik. , 2007, "Location Privacy & Location Aware Computing" Proceeding of HICSS, pp. 213-220.
  11. R. Shokri, G. Theodorakopoulos , C. Troncoso, J. Hubaux and J. Boudec, 2012, "Protecting Location Privacy: Optimal Strategy against Localization Attacks", Proceedings of CCS'12, October 16–18, 2012, Raleigh, North Carolina, USA, pp. 1-11.
Index Terms

Computer Science
Information Sciences

Keywords

Location-based service [LBS] wireless ad-hoc networks LCA GCA