CFP last date
20 May 2024
Reseach Article

Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications

by B. N. Jagdale, N. S. Gawande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 21
Year of Publication: 2012
Authors: B. N. Jagdale, N. S. Gawande
10.5120/9235-3532

B. N. Jagdale, N. S. Gawande . Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications. International Journal of Computer Applications. 57, 21 ( November 2012), 1-10. DOI=10.5120/9235-3532

@article{ 10.5120/9235-3532,
author = { B. N. Jagdale, N. S. Gawande },
title = { Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 21 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number21/9235-3532/ },
doi = { 10.5120/9235-3532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:02.248311+05:30
%A B. N. Jagdale
%A N. S. Gawande
%T Hybrid model for Location Privacy in Wireless Ad-Hoc Networks for Mobile Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 21
%P 1-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Now a day in fast growing world, use of internet is increasing popularly and at the same time Location-based service is also getting more popular even in ad-hoc network. Location-based service providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual by applying K- anonymization and obfuscation algorithms . This objective is achieved by simulating K- anonymization and obfuscation algorithms for Manhattan mobility model and Waypoint mobility model using NS-2. 34 environment. In the experiments, the user's current location is hide by rectangle [bounding box] according to users privacy need.

References
  1. T. Hashem and L. Kulik , 2007, "Safeguarding Location Privacy in Wireless Ad-Hoc Networks" , UbiComp 2007, LNCS 4717, pp. 372–390, Springer-Verlag Berlin Heidelberg .
  2. M. F. Mokbel, C. Y. Chow and W. G. Aref , 2009, "The New Casper: Query Processing for Location Services without Compromising Privacy', VLDB Endowment, ACM 159593385-9/06/09.
  3. C. Y. Chow, M. F. Mokbel and T. He, 2011, "A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks", IEEE Mobile Computing, vol. 10, no. 1, pp. 1-14.
  4. M. Duckham and L. Kulik, 2005, "A Formal Model of Obfuscation and Negotiation for Location Privacy", Proc. Of Pervasive Computing, 2005: pp. 152–170.
  5. L. Sweeney and P. Samarati, 2002, "Protecting Privacy When Disclosing Information: k-anonymity & its enforcement through Generalization", in Proc. of MobiCom.
  6. L. Sweeney, 2002, "k- Anonymity: A Model for Protecting Privacy. " International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570.
  7. M. Duckham and L. Kulik, 2007, "Location Privacy & Location Aware Computing", in Proceedings of HICSS, pp. 1-7.
  8. Y. Zhu and R. Bellati, 2007, "Compromising Location Privacy in WSN with limited information", Proc. of ICDCS-2007, Pages 24.
  9. C. A. Ardagna, M. Cremonini, E. Damiani, S. De, C. Vimercati, and P. Samarati, 2007, "Location privacy protection through obfuscation-based techniques", Lecture Notes in Computer Science, LNCS 4602, Springer, Berlin, pp. 47–60.
  10. M. Duckham and L. Kulik. , 2007, "Location Privacy & Location Aware Computing" Proceeding of HICSS, pp. 213-220.
  11. R. Shokri, G. Theodorakopoulos , C. Troncoso, J. Hubaux and J. Boudec, 2012, "Protecting Location Privacy: Optimal Strategy against Localization Attacks", Proceedings of CCS'12, October 16–18, 2012, Raleigh, North Carolina, USA, pp. 1-11.
Index Terms

Computer Science
Information Sciences

Keywords

Location-based service [LBS] wireless ad-hoc networks LCA GCA