Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

Full Text (PDF, 889KB), PP.14-23

Views: 0 Downloads: 0

Author(s)

Balasaheb N. Jagdale 1,* Nileema S. Gawande 1

1. Department of Information Technology, MIT College of Engineering, Pune-411038, Maharashtra

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.01.02

Received: 16 Feb. 2012 / Revised: 11 May 2012 / Accepted: 26 Jul. 2012 / Published: 8 Jan. 2013

Index Terms

LBS, wireless ad-hoc networks, LCA, GCA

Abstract

In the today's fast growing world, use of internet is increasing popularly and at the same time Location-based services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual. This objective is achieved by simulating locally cloak algorithm and globally cloak algorithm for Manhattan mobility model and Waypoint mobility model using NS-2.34 environment. In the experiments, to hide the user's current locations in rectangle [bounding box] according to users privacy need, obfuscation and k-anonymity strategies are used.

Cite This Paper

Balasaheb N. Jagdale, Nileema S. Gawande, "Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.1, pp.14-23, 2013. DOI:10.5815/ijcnis.2013.01.02

Reference

[1]T. Hashem and L. Kulik , "Safeguarding Location Privacy in Wireless Ad-Hoc Networks" , UbiComp 2007, LNCS 4717, pp.372–390, Springer-Verlag Berlin Heidelberg 2007.
[2]M. F. Mokbel, C. Y. Chow and W. G. Aref , "The New Casper: Query Processing for Location Services without Compromising Privacy', VLDB Endowment, ACM 159593385-9/06/09.
[3]C. Y. Chow, M. F. Mokbel and T. He, "A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks", IEEE Mobile Computing, vol.10, no.1, pp.1-14, January, 2011.
[4]M. Duckham and L. Kulik, "A Formal Model of Obfuscation and Negotiation for Location Privacy", Proc. Of Pervasive Computing, 2005: pp.152–170, 2005.
[5]L. Sweeney and P. Samarati, "Protecting Privacy When Disclosing Information: k-anonymity & its enforcement through Generalization" , Proc. of MobiCom, 2002.
[6]L. Sweeney, "k- Anonymity: A Model for Protecting Privacy." International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no.5, pp.557-570, 2002.
[7]M. Duckham and L. Kulik, "Location Privacy & Location Aware Computing" Proc. of HICSS, 2007.
[8]Y. Zhu and R. Bellati, "Compromising Location Privacy in WSN with limited information", Proc. of ICDCS-2007, Pages 24, 2007.
[9]C. A. Ardagna, M. Cremonini, E. Damiani, S. De, C. Vimercati, and P. Samarati, "Location privacy protection through obfuscation-based techniques", Lecture Notes in Computer Science, LNCS 4602, Springer, Berlin, pp.47–60, 2007.
[10]M. Duckham and L. Kulik., "Location Privacy & Location Aware Computing" Proceeding of HICSS, pp.213-220, 2007.