{"title":"利用动态聚类确保机会网络中的隐私","authors":"Prabhleen Kaur, Jasvir Singh","doi":"10.1109/ICACEA.2015.7164826","DOIUrl":null,"url":null,"abstract":"Opportunistic networks are type of challenged mobile Ad-Hoc Networks (MANETs). In Opportunistic Networks (OppNets), mobile devices send out the messages by exploiting the unswerving contacts, without the requisite of an end-to-end communications. In such a system, nodes are sporadic and there does not subsist an ample path from source to destination customarily. The message forwarding in such a network is a strenuous problem and is based on the hypothesis that users are willing to forward messages to each other but this assumption does not hold true always due to privacy as user's location may be leaked. To boot, the path can also be exceedingly unstable and may vary or shatter swiftly. So in line to craft communication doable in an opportunistic network, the intermediate nodes may take incarceration of data during the collapse and redirect it when the connectivity resumes.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Ensuring privacy in opportunistic networks using dynamic clustering\",\"authors\":\"Prabhleen Kaur, Jasvir Singh\",\"doi\":\"10.1109/ICACEA.2015.7164826\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Opportunistic networks are type of challenged mobile Ad-Hoc Networks (MANETs). In Opportunistic Networks (OppNets), mobile devices send out the messages by exploiting the unswerving contacts, without the requisite of an end-to-end communications. In such a system, nodes are sporadic and there does not subsist an ample path from source to destination customarily. The message forwarding in such a network is a strenuous problem and is based on the hypothesis that users are willing to forward messages to each other but this assumption does not hold true always due to privacy as user's location may be leaked. To boot, the path can also be exceedingly unstable and may vary or shatter swiftly. So in line to craft communication doable in an opportunistic network, the intermediate nodes may take incarceration of data during the collapse and redirect it when the connectivity resumes.\",\"PeriodicalId\":202893,\"journal\":{\"name\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-03-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACEA.2015.7164826\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Computer Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACEA.2015.7164826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ensuring privacy in opportunistic networks using dynamic clustering
Opportunistic networks are type of challenged mobile Ad-Hoc Networks (MANETs). In Opportunistic Networks (OppNets), mobile devices send out the messages by exploiting the unswerving contacts, without the requisite of an end-to-end communications. In such a system, nodes are sporadic and there does not subsist an ample path from source to destination customarily. The message forwarding in such a network is a strenuous problem and is based on the hypothesis that users are willing to forward messages to each other but this assumption does not hold true always due to privacy as user's location may be leaked. To boot, the path can also be exceedingly unstable and may vary or shatter swiftly. So in line to craft communication doable in an opportunistic network, the intermediate nodes may take incarceration of data during the collapse and redirect it when the connectivity resumes.