DocumentCode :
1676275
Title :
Collaborated Camouflaging Mobility for Mobile Privacy
Author :
Tang, Lei ; Vrbsky, Susan ; Hong, Xiaoyan
Author_Institution :
Dept. of Comput. Sci., Rice Univ., TX
fYear :
2008
Firstpage :
1
Lastpage :
5
Abstract :
We present a collaborated camouflaging mobility algorithm to protect mobile hosts´ mobility privacy. Our algorithm alters a mobile host´s straight moving paths into Delta-shaped camouflaging paths, which cause its wireless transmissions to be distributed over a large area, and hence, reduce the probability of generating traceable wireless transmissions. Furthermore, on the premise of not affecting the mobile hosts´ itineraries, our collaborated mobility algorithm clusters the motion paths of mobile hosts to make it difficult for an adversary to identify the mobile hosts. We model the objective of maximizing mobility privacy and minimizing the overhead (e.g. the extra travel distance) as a nonlinear constrained optimization problem and use the solution to the optimization problem as the collaborated mobility. Lastly, we analyze the calculation time of the collaborated camouflaging mobility and conduct simulations to evaluate the privacy improvements brought by the collaborated camouflaging mobility algorithm compared with non-covered mobility.
Keywords :
constraint handling; groupware; mobile computing; mobility management (mobile radio); nonlinear programming; security of data; collaborated camouflaging mobility; mobile privacy; nonlinear constrained optimization problem; wireless transmissions; Algorithm design and analysis; Clustering algorithms; Collaboration; Computer science; Constraint optimization; Mobile computing; Privacy; Protection; Radio transmitters; Routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
Conference_Location :
New Orleans, LO
ISSN :
1930-529X
Print_ISBN :
978-1-4244-2324-8
Type :
conf
DOI :
10.1109/GLOCOM.2008.ECP.415
Filename :
4698190
Link To Document :
بازگشت