Receiver Location

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 19425 Experts worldwide ranked by ideXlab platform

Xue Min Shen - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • STAP: A social-tier-assisted packet forwarding protocol for achieving Receiver-Location privacy preservation in VANETs
    Proceedings - IEEE INFOCOM, 2011
    Co-Authors: Xiaodong Lin, Xiaohui Liang, Rongxing Lu, Xue Min Shen
    Abstract:

    Receiver-Location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable Receiver's Location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving Receiver-Location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the Receiver's exact Location information, a packet can be first forwarded and disseminated in the social tier. Later, once the Receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the Receiver's Location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

  • INFOCOM - STAP: A social-tier-assisted packet forwarding protocol for achieving Receiver-Location privacy preservation in VANETs
    2011 Proceedings IEEE INFOCOM, 2011
    Co-Authors: Xiaodong Lin, Xiaohui Liang, Xue Min Shen
    Abstract:

    Receiver-Location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable Receiver's Location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving Receiver-Location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the Receiver's exact Location information, a packet can be first forwarded and disseminated in the social tier. Later, once the Receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the Receiver's Location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

  • Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET
    2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
    Co-Authors: Rongxing Lu, Xiaohui Liang, Xue Min Shen
    Abstract:

    In this paper, to simultaneously protect the Receiver-Location privacy and improve the performance of packet delivery in VANET, we utilize ``Sacrificing the Plum Tree for the Peach Tree" - one of the Thirty-Six Strategies of Ancient China, to propose a socialspot-based packet forwarding (SPF) protocol, where each vehicle Receiver only reveals a non-sensitive socialspot, e.g., a shopping mall, that he often visits as a relay node to help packet forwarding and protect his other sensitive Locations privacy. Detailed security analysis demonstrates the security of the proposed SPF protocol. In addition, extensive simulations have also been conducted to examine its good efficiency in terms of packet delivery ratio and average delay.

Xiaohui Liang - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • STAP: A social-tier-assisted packet forwarding protocol for achieving Receiver-Location privacy preservation in VANETs
    Proceedings - IEEE INFOCOM, 2011
    Co-Authors: Xiaodong Lin, Xiaohui Liang, Rongxing Lu, Xue Min Shen
    Abstract:

    Receiver-Location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable Receiver's Location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving Receiver-Location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the Receiver's exact Location information, a packet can be first forwarded and disseminated in the social tier. Later, once the Receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the Receiver's Location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

  • INFOCOM - STAP: A social-tier-assisted packet forwarding protocol for achieving Receiver-Location privacy preservation in VANETs
    2011 Proceedings IEEE INFOCOM, 2011
    Co-Authors: Xiaodong Lin, Xiaohui Liang, Xue Min Shen
    Abstract:

    Receiver-Location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable Receiver's Location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving Receiver-Location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the Receiver's exact Location information, a packet can be first forwarded and disseminated in the social tier. Later, once the Receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the Receiver's Location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

  • Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET
    2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
    Co-Authors: Rongxing Lu, Xiaohui Liang, Xue Min Shen
    Abstract:

    In this paper, to simultaneously protect the Receiver-Location privacy and improve the performance of packet delivery in VANET, we utilize ``Sacrificing the Plum Tree for the Peach Tree" - one of the Thirty-Six Strategies of Ancient China, to propose a socialspot-based packet forwarding (SPF) protocol, where each vehicle Receiver only reveals a non-sensitive socialspot, e.g., a shopping mall, that he often visits as a relay node to help packet forwarding and protect his other sensitive Locations privacy. Detailed security analysis demonstrates the security of the proposed SPF protocol. In addition, extensive simulations have also been conducted to examine its good efficiency in terms of packet delivery ratio and average delay.

Hai Zhao - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

Rongxing Lu - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • VSLP: Voronoi-socialspot-aided packet forwarding protocol with Receiver Location Privacy in MSNs
    2012 IEEE Global Communications Conference (GLOBECOM), 2012
    Co-Authors: Xiaohui Liang, Xue Min Shen, Rongxing Lu, Hai Zhao
    Abstract:

    With the pervasive use of smart phones in the daily life, Location privacy has become one of cruxes for the success of mobile social networks (MSNs). In this paper, we propose a Voronoi-social-spot-aided Location Privacy-preserving (VSLP) packet forwarding protocol to improve the packet forwarding efficiency and at the same time protect Receiver's Location privacy. In VSLP, we first identify the social spot Locations according to the user mobility information, and then build a Voronoi diagram based on the defined social spots. On the edge of Delaunay triangulation over the Voronoi diagram, we deploy multiple storage devices to help Receivers to temporarily store the packets. With the security analysis, we show that the Location privacy can be achieved. Using extensive simulations, we show that VSLP can enhance the packet forwarding efficiency with improved packet delivery ratio and reduced average packet delay.

  • STAP: A social-tier-assisted packet forwarding protocol for achieving Receiver-Location privacy preservation in VANETs
    Proceedings - IEEE INFOCOM, 2011
    Co-Authors: Xiaodong Lin, Xiaohui Liang, Rongxing Lu, Xue Min Shen
    Abstract:

    Receiver-Location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable Receiver's Location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving Receiver-Location privacy preservation in VANETs. Specifically, by observing the phenomena that vehicles often visit some social spots, such as well-traversed shopping malls and busy intersections in a city environment, we deploy storage-rich Roadside Units (RSUs) at social spots and form a virtual social tier with them. Then, without knowing the Receiver's exact Location information, a packet can be first forwarded and disseminated in the social tier. Later, once the Receiver visits one of social spots, it can successfully receive the packet. Detailed security analysis shows that the proposed STAP protocol can protect the Receiver's Location privacy against an active global adversary, and achieve vehicle's conditional privacy preservation as well. In addition, performance evaluation via extensive simulations demonstrates its efficiency in terms of high delivery ratio and low average delay.

  • Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET
    2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
    Co-Authors: Rongxing Lu, Xiaohui Liang, Xue Min Shen
    Abstract:

    In this paper, to simultaneously protect the Receiver-Location privacy and improve the performance of packet delivery in VANET, we utilize ``Sacrificing the Plum Tree for the Peach Tree" - one of the Thirty-Six Strategies of Ancient China, to propose a socialspot-based packet forwarding (SPF) protocol, where each vehicle Receiver only reveals a non-sensitive socialspot, e.g., a shopping mall, that he often visits as a relay node to help packet forwarding and protect his other sensitive Locations privacy. Detailed security analysis demonstrates the security of the proposed SPF protocol. In addition, extensive simulations have also been conducted to examine its good efficiency in terms of packet delivery ratio and average delay.

Javier Lopez - One of the best experts on this subject based on the ideXlab platform.

  • Probabilistic Receiver-Location privacy protection in wireless sensor networks
    Information Sciences, 2015
    Co-Authors: Ruben Rios, Jorge Cuellar, Javier Lopez
    Abstract:

    Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among these, the attacks targeted at the base station are the most devastating ones since this essential device processes and analyses all traffic generated in the network. Moreover, this feature can be exploited by a passive adversary to determine its Location based on traffic analysis. This Receiver-Location privacy problem can be reduced by altering the traffic pattern of the network but the adversary may still be able to reach the base station if he gains access to the routing tables of a number of sensor nodes. In this paper we present HISP-NC (Homogenous Injection for Sink Privacy with Node Compromise protection), a Receiver-Location privacy solution that consists of two complementary schemes which protect the Location of the base station in the presence of traffic analysis and node compromise attacks. The HISP-NC data transmission protocol prevents traffic analysis by probabilistically hiding the flow of real traffic with moderate amounts of fake traffic. Moreover, HISP-NC includes a perturbation mechanism that modifies the routing tables of the nodes to introduce some level of uncertainty in attackers capable of retrieving the routing information from the nodes. Our scheme is validated both analytically and experimentally through extensive simulations.

  • preserving Receiver Location privacy in wireless sensor networks
    Information Security Practice and Experience, 2014
    Co-Authors: Javier Lopez, Ruben Rios, Jorge Cuellar
    Abstract:

    Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the Location of this critical device. This Receiver-Location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain Location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution

  • ISPEC - Preserving Receiver-Location Privacy in Wireless Sensor Networks
    Information Security Practice and Experience, 2014
    Co-Authors: Javier Lopez, Ruben Rios, Jorge Cuellar
    Abstract:

    Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the Location of this critical device. This Receiver-Location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain Location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution

  • robust probabilistic fake packet injection for Receiver Location privacy in wsn
    European Symposium on Research in Computer Security, 2012
    Co-Authors: Ruben Rios, Jorge Cuellar, Javier Lopez
    Abstract:

    The singular communication model in wireless sensor networks (WSNs) originate pronounced traffic patterns that allow a local observer to deduce the Location of the base station, which must be kept secret for both strategical and security reasons. In this work we present a new Receiver-Location privacy solution called HISP (Homogenous Injection for Sink Privacy). Our scheme is based on the idea of hiding the flow of real traffic by carefully injecting fake traffic to homogenize the transmissions from a node to its neighbors. This process is guided by a lightweight probabilistic approach ensuring that the adversary cannot decide with sufficient precision in which direction to move while maintaining a moderate amount of fake traffic. Our system is both validated analytically and experimentally through simulations.

  • ESORICS - Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
    Computer Security – ESORICS 2012, 2012
    Co-Authors: Ruben Rios, Jorge Cuellar, Javier Lopez
    Abstract:

    The singular communication model in wireless sensor networks (WSNs) originate pronounced traffic patterns that allow a local observer to deduce the Location of the base station, which must be kept secret for both strategical and security reasons. In this work we present a new Receiver-Location privacy solution called HISP (Homogenous Injection for Sink Privacy). Our scheme is based on the idea of hiding the flow of real traffic by carefully injecting fake traffic to homogenize the transmissions from a node to its neighbors. This process is guided by a lightweight probabilistic approach ensuring that the adversary cannot decide with sufficient precision in which direction to move while maintaining a moderate amount of fake traffic. Our system is both validated analytically and experimentally through simulations.