We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Ensuring Privacy in Opportunistic Network

by Maggi Goyal, Manoj Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 4
Year of Publication: 2013
Authors: Maggi Goyal, Manoj Chaudhary
10.5120/13234-0666

Maggi Goyal, Manoj Chaudhary . Ensuring Privacy in Opportunistic Network. International Journal of Computer Applications. 76, 4 ( August 2013), 11-17. DOI=10.5120/13234-0666

@article{ 10.5120/13234-0666,
author = { Maggi Goyal, Manoj Chaudhary },
title = { Ensuring Privacy in Opportunistic Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 4 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number4/13234-0666/ },
doi = { 10.5120/13234-0666 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:01.044273+05:30
%A Maggi Goyal
%A Manoj Chaudhary
%T Ensuring Privacy in Opportunistic Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 4
%P 11-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The emanate of extremely powerful mobile communication devices in recent times has elicit the development of many exploitative technologies that attempt at leveraging the ever increasing processing, storage and communicating capacities of these devices. One of the most developing areas of network is opportunistic network that provides communication even in disconnected mode. Nodes are mobile and can change their location and message or packet is forward through many intermediate nodes so identity of users is shown to all. Any intermediate can drop the data packets if the node is malicious and do not wishes to forward the data to a particular destination id. A few privacy preventing algorithms are proposed to maintain it. In this research an algorithm is proposed to maintain the privacy of user if user wants it. Stable node provides a new virtual ID to a user who wishes to communicate without disclosing his privacy. This research ensures the privacy of the data with the use of concept of cluster estimation. In this research the public private cryptography technique is used for data encryption and decryption. Algorithm is implemented on NS2 (Network Simulator 2. 35).

References
  1. Anna Scaglione "Opportunistic Large Arrays: Cooperative Transmission in Wireless Multihop Ad Hoc Networks to Reach Far Distances" IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003.
  2. Chiara Boldrini, Marco Conti, Andrea Passarella "Exploiting users' social relations to forward data in opportunistic Networks" 1016/j. pmcj. 2008. 04. 003 2008 Elsevier.
  3. Zehua Wang "CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks" IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 2, FEBRUARY 2012.
  4. J. P. Tower and T. D. C. Little "A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks" In Proc. 1st IEEE Intl. Workshop on Opportunistic Networking, Okinawa, Japan, March 2008.
  5. Gokce Gorbil, Erol Gelenbe "Opportunistic Communications for Emergency Support Systems" 1877–0509 © 2011 Published by Elsevier 10. 1016/j. procs. 2011. 07. 008.
  6. B. Poonguzharselvi1 and V. Vetriselvi "Trust Framework for Data Forwarding in Opportunistic network Using Mobile Traces" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 6, December 2012.
  7. Abdullatif Shikfa, Melek Önen, Refik Molva "Privacy and confidentiality in context-based and epidemic forwarding" 2010 Published by Elsevier B. V:10. 1016/j. comcom. 2010. 04. 035
  8. Abdullatif Shikfa and Melek Önen and Refik Molva "Local key management in opportunistic networks" Int. J. Communication Networks and Distributed Systems, Vol. 9, Nos. 1/2, 2012.
  9. Enrico Scalavino, Giovanni Russello and Rudi Ball "An Opportunistic Authority Evaluation Scheme for Data Security in Crisis Management Scenarios" ASIACCS'10 April 13–16, 2010, Beijing, China.
  10. Ram Ramanathan, Richard Hansen "Prioritized Epidemic Routing for Opportunistic Networks" June11, 2007, San Juan, Puerto Rico, USA.
  11. Pelusi, L. , Passarella, A. and Conti, M. (2006) "Opportunistic networking: data forwarding in disconnected mobile ad hoc networks", IEEE Communications Magazine, Vol. 44, pp. 134–141.
  12. Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra "Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case" IEEE/ACM Transactions on Networking, Vol. 16, No. 1, February 2008.
  13. Mamoun Hussein Mamoun, Saud Barrak "Adaptive Priority Routing Protocol for DTN Networks" International Journal of Engineering and Technology Volume 3 No. 3, March, 2013.
  14. A. Vahdat and D. Becker, "Epidemic routing for partially-connected ad hoc networks" Duke University, Tech. Rep. CS-2000-06, Jul. 2000.
  15. S. Jain, K. Fall, and R. Patra, "Routing in a delay tolerant network," in Proc. ACM SIGCOMM, Oct. 2004.
  16. A. Doria, M. Uden, and D. P. Pandey, Providing connectivity to the saami nomadic community, in Proceedings of the 2nd International Conference on Open Collaborative Design for Sustainable Innovation (dyd 02), Bangalore, India, Dec 2002.
  17. A. Pentland, R. Fletcher, and A. A. Hasson, A road to universal broadband connectivity, in Proceedings of the 2nd International Conference on Open Collaborative Design for Sustainable Innovation (dyd 02), Bangalore, India, Dec 2002.
  18. G. E. Prescott, S. A. Smith, and K. Moe, Real-time information system technology challenges for NASAs earth science enterprise, in Proceedings of The 20th IEEE Real-Time Systems Symposium, Phoenix, Arizona, Dec 1999.
  19. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, Energy-e?cient computing for wildlife tracking: design tradeo?s and early experiences with zebranet, in Proceedings of ACM ASPLOS, 2002.
  20. Disruption tolerant networking, http://www. darpa. mil/ato/solicit/DTN/
  21. J. Ott and D. Kutscher, A disconnection-tolerant transport for drive-thru internet environments, in Proceedings of IEEE INFOCOM, 2005.
  22. Eyuphan Bulut and Boleslaw K. Szymanski, "On Secure Multi-copy based Routing in Compromised Delay Tolerant Networks," Workshop on Privacy, Security and Trust in Mobile and Wireless systems at 20th IEEE International Conference on Computer Communications, ICCCN, Maui, Hawaii, July 31,2011.
  23. P. Hui, A. Chaintreau, R. Gass, J. Scott, J. Crowcroft, and C. Diot, "Pocket switched networking: challenges, feasibility and implementation issues," Lecture Notes in Computer Science, vol. 3854, pp. 1–12, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Opportunistic