A K-Anonymity Confidentiality Defending Locality Examining Scheme for Wireless Networks with Jack Secure System

Anonymizing wireless networks permit users to access services confidentially with the help of a series of routers in order to conceal the IP address of the client from the server. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving. To address this problem, servers can "Blacklist" misbehaving users, by this means blocking users devoid of compromising their anonymity. Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals; a privacy preserving location monitoring system for wireless networks is adopted.

Provided by: International Journal of Computer Networks and Wireless Communications (IJCNWC) Topic: Networking Date Added: Oct 2012 Format: PDF

Download Now

Find By Topic