• DocumentCode
    58386
  • Title

    Reputation Aware Obfuscation for Mobile Opportunistic Networks

  • Author

    Radenkovic, Milena ; Benslimane, Abderrahim ; McAuley, Derek

  • Author_Institution
    Sch. of Comput. Sci., Univ. of Nottingham, Nottingham, UK
  • Volume
    26
  • Issue
    1
  • fYear
    2015
  • fDate
    Jan. 2015
  • Firstpage
    230
  • Lastpage
    240
  • Abstract
    Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node´s identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large number of malicious nodes and new opportunistic, adaptive. So, new, opportunistic, adaptive fully localized mechanisms are needed for improving user anonymity. This paper proposes reputation aware localized adaptive obfuscation for mobile opportunistic networks that comprises of two complementary techniques: opportunistic collaborative testing of nodes´ obfuscation behaviour (OCOT) and multidimensional adaptive anonymisation (AA). OCOT-AA is driven by both explicit and implicit reputation building, complex graph connectivity analytics and obfuscation history analyses. We show that OCOT-AA is very efficient in terms of achieving high levels of node identity obfuscation and managing low delays for answering queries between sources and destinations while enabling fast detection and avoidance of malicious nodes typically within the fraction of time within the experiment duration. We perform extensive experiments to compare OCOT-AA with several other competitive and benchmark protocols and show that it outperforms them across a range of metrics over a one month real-life GPS trace. To demonstrate our proposal more clearly, we propose new metrics that include best effort biggest length and diversity of the obfuscation paths, the actual percentage of truly anonymised sources´ IDs at the destinations and communication quality of service between source and destination.
  • Keywords
    data privacy; mobile computing; mobile radio; overlay networks; OCOT-AA; anonymity techniques; benchmark protocols; communication quality; complementary techniques; complex graph connectivity analytics; disconnection prone networks; explicit reputation building; implicit reputation building; malicious nodes; mobile opportunistic networks; multidimensional adaptive anonymisation; node identity; obfuscation algorithms; obfuscation behaviour; obfuscation history analyses; obfuscation paths; opportunistic collaborative testing; reputation aware localized adaptive obfuscation; user anonymity; Decision support systems; Mobile communication systems; privacy;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2013.265
  • Filename
    6636891