Skip to content

Research at St Andrews

The impact of location privacy on opportunistic networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Author(s)

Iain Parris, Tristan Henderson

School/Research organisations

Abstract

Opportunistic networking involves forwarding messages between proximate users, who may or may not know one another. This assumes that users are willing to forward messages to each other. This assumption may not hold if users are concerned about using the opportunistic network service. One such concern may be due to privacy; for instance, users' locations may be leaked. A privacy-concerned user may therefore disable their mobile device's opportunistic-networking features at various times, to preserve their privacy. This paper studies the impact of location privacy concerns on the performance of an opportunistic network. Using data from a real-world location-aware user study to develop a privacy model, we conduct trace-based simulations of various opportunistic routing protocols with two real-world traces. We find that users' location privacy preferences may potentially reduce the delivery performance of an opportunistic network to zero.
Close

Details

Original languageEnglish
Title of host publication2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
PublisherIEEE
Number of pages6
ISBN (Electronic)978-1-4577-0350-8
ISBN (Print)978-1-4577-0352-2
DOIs
Publication statusPublished - 23 Jun 2011
EventThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) - Lucca, Italy
Duration: 20 Jun 201124 Jun 2011

Conference

ConferenceThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC)
Country/TerritoryItaly
CityLucca
Period20/06/1124/06/11

    Research areas

  • Mobile radio, Routing protocols, Security of data, Telecommunication security

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Data portability as a tool for audit

    Zwiebelmann, Z. & Henderson, T., 21 Sep 2021, UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers. ACM, p. 276–280 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  4. Short paper: Integrating the data protection impact assessment into the software development lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 2020, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Garcia-Alfaro, J., Navarro-Arribas, G. & Herrera-Joancomarti, J. (eds.). Cham: Springer, p. 219-228 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. 12484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 14687004

Top