{"title":"通过承载和跳数修改实现manet中数据请求的保密性","authors":"Noor Abbani, H. Artail","doi":"10.1109/ICCCN.2013.6614100","DOIUrl":null,"url":null,"abstract":"Caching systems have been proposed for MANETs to increase data availability and reduce data access delays. Every caching system is composed of three main components. The first component is requesting the data items from the server into the caching system. The second component is publishing the cached items in the network (or advertising them). While, the third component relates to nodes requesting cached items, or in other words pulling the items. These three aspects have inherent privacy problems that result in exposing the identities of the participants and in profiling their interests. In this work, we survey existing caching architectures for privacy vulnerabilities and propose a privacy preserving system that can operate on top of any existing caching system that provides anonymity and untraceability objectives. The system was implemented using ns-2 and proved to achieve high levels of anonymity with mitigated delays and overhead traffic.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification\",\"authors\":\"Noor Abbani, H. Artail\",\"doi\":\"10.1109/ICCCN.2013.6614100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Caching systems have been proposed for MANETs to increase data availability and reduce data access delays. Every caching system is composed of three main components. The first component is requesting the data items from the server into the caching system. The second component is publishing the cached items in the network (or advertising them). While, the third component relates to nodes requesting cached items, or in other words pulling the items. These three aspects have inherent privacy problems that result in exposing the identities of the participants and in profiling their interests. In this work, we survey existing caching architectures for privacy vulnerabilities and propose a privacy preserving system that can operate on top of any existing caching system that provides anonymity and untraceability objectives. The system was implemented using ns-2 and proved to achieve high levels of anonymity with mitigated delays and overhead traffic.\",\"PeriodicalId\":207337,\"journal\":{\"name\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2013.6614100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2013.6614100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification
Caching systems have been proposed for MANETs to increase data availability and reduce data access delays. Every caching system is composed of three main components. The first component is requesting the data items from the server into the caching system. The second component is publishing the cached items in the network (or advertising them). While, the third component relates to nodes requesting cached items, or in other words pulling the items. These three aspects have inherent privacy problems that result in exposing the identities of the participants and in profiling their interests. In this work, we survey existing caching architectures for privacy vulnerabilities and propose a privacy preserving system that can operate on top of any existing caching system that provides anonymity and untraceability objectives. The system was implemented using ns-2 and proved to achieve high levels of anonymity with mitigated delays and overhead traffic.