Difficulties in simulating the internet
IEEE/ACM Transactions on Networking (TON)
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Using the Experience Sampling Method to Evaluate Ubicomp Applications
IEEE Pervasive Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
MANET simulation studies: the incredibles
ACM SIGMOBILE Mobile Computing and Communications Review - Special Issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks.: The Digital Library version of this issue has a corrected special issue title compared to the one in the print version of the issue.
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Pervasive and Mobile Computing
Promoting tolerance for delay tolerant network research
ACM SIGCOMM Computer Communication Review
Toward a distributed k-anonymity protocol for location privacy
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs
IEEE Transactions on Mobile Computing
Proceedings of the fourth international conference on Communities and technologies
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
PEON: privacy-enhanced opportunistic networks with applications in assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
MobiClique: middleware for mobile social networking
Proceedings of the 2nd ACM workshop on Online social networks
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
Impact of altruism on opportunistic communications
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Anti-localization anonymous routing for Delay Tolerant Network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy and confidentiality in context-based and epidemic forwarding
Computer Communications
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Forwarding devices: From measurements to simulations
ACM Transactions on Modeling and Computer Simulation (TOMACS)
The Effect of Network Realism on Community Detection Algorithms
ASONAM '10 Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining
Comparing simulation tools and experimental testbeds for wireless mesh networks
WOWMOM '10 Proceedings of the 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
Reality vs emulation: running real mobility traces on a mobile wireless testbed
HotPlanet '11 Proceedings of the 3rd ACM international workshop on MobiArch
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Privacy-enhanced social-network routing
Computer Communications
The impact of location privacy on opportunistic networks
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
On credibility of simulation studies of telecommunication networks
IEEE Communications Magazine
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
The credibility of mobile ad hoc network simulations depends on accurate characterisations of user behaviour, e.g., mobility and application usage. If simulated nodes communicate at different rates to real nodes, or move in an unrealistic fashion, this may have a large impact on the network protocols being simulated and tested. Many future mobile network protocols, however, may also depend on future mobile applications. Different applications may be used at different rates or in different manners. But how can we determine realistic user behaviour for such applications that do not yet exist? One common solution is again simulation, but this time simulation of these future applications. This paper examines differences in user behaviour between a real and simulated mobile social networking application through a user study (n=80). We show that there are distinct differences in privacy behaviour between the real and simulated groups. We then simulate a mobile opportunistic network application using two real-world traces to demonstrate the impact of using real and simulated applications. We find large differences between using real and synthetic models of privacy behaviour, but smaller differences between models derived from the real and simulated applications.