Security and trust management in opportunistic networks: a survey

Y Wu, Y Zhao, M Riguidel, G Wang… - Security and …, 2015 - Wiley Online Library
As a new networking paradigm, opportunistic networking communications have great vision
in animal migration tracking, mobile social networking, network communications in remote …

Social-aware stateless routingin pocket switched networks

A Mei, G Morabito, P Santi… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Existing social-aware routing protocols for pocket switched networks make use of the
information about the social structure of the network deduced by state information of nodes …

ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks

N Magaia, C Borrego, PR Pereira… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes an enhanced PRIvacy preserVing opportunistic routing protocol
(ePRIVO) for vehicular delay-tolerant networks (VDTN). ePRIVO models a VDTN as a time …

PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks

N Magaia, C Borrego, P Pereira… - 2017 IFIP Networking …, 2017 - ieeexplore.ieee.org
This paper introduces PRIVO, a PRIvacy-preserVing Opportunistic routing protocol for Delay
Tolerant Networks. PRIVO models a DTN as a time-varying neighboring graph where edges …

Opportunistic sensor networks: A survey on privacy and secure routing

MS Arafath, KUR Khan - 2017 2nd International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement of mobile devices, a new paradigm called opportunistic sensor
networks emerges which has a lot of applications, such as Military surveillance, disaster …

Security in ambient intelligence and internet of things

SA Mohammed, MR Mahmood - Ambient Intelligence and …, 2022 - Wiley Online Library
Many paradigm‐s have shifted from the realm of computer networks to the world of Ambient
Intelligence and IoT. The network's and its deployment's perspective has shifted. A 60‐year …

Authenticating with privacy protection in opportunistic networks

MH Guo, HT Liaw, MY Chiu… - 2015 11th International …, 2015 - ieeexplore.ieee.org
In this study, we propose an authentication mechanism with privacy protection for
opportunistic networks. It is applied for the short-term and limited-time wireless network …

An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast

G Costantino, F Martinelli, P Santi… - Proceedings of the 18th …, 2012 - dl.acm.org
For this demo, we present an implementation of the FairPlay framework for secure two-party
function computation on Android smartphones, which we call MobileFairPlay …

[HTML][HTML] Blossom: cluster-based routing for preserving privacy in opportunistic networks

B Kluss, S Rashidibajgan, T Hupperich - Journal of Sensor and Actuator …, 2022 - mdpi.com
Opportunistic networks are an enabler technology for typologies without centralized
infrastructure. Portable devices, such as wearable and embedded mobile systems, send …

Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting

G Costantino, F Martinelli, P Santi - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Many mobile social networking applications are based on a “friend proximity detection” step,
according to which two mobile users try to jointly estimate whether they have friends in …