A K-Anonymity Confidentiality Defending Locality Examining Scheme for Wireless Networks with Jack Secure System

Free registration required

Executive Summary

Anonymizing wireless networks permit users to access services confidentially with the help of a series of routers in order to conceal the IP address of the client from the server. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving. To address this problem, servers can "Blacklist" misbehaving users, by this means blocking users devoid of compromising their anonymity. Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals; a privacy preserving location monitoring system for wireless networks is adopted.

  • Format: PDF
  • Size: 208.2 KB