Algorithms for advanced clandestine tracking in short-range ad hoc networks

Saif Al-Kuwari*, Stephen D. Wolthusen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Law enforcement tracking applications are usually required to be passive such that the target is not aware of the tracking process. This passivity requirement can severely affect the accuracy of the tracking process especially in cluttered and densely populated areas. However, short range emissions from mobile devices such as phones and accessories can be used to improve the accuracy of these passive tracking applications. In this paper, we adopt an agent-based clandestine tracking approach where a set of dynamically recruited tracking agents observe single or multiple targets and report to single or multiple trackers. We also describe a few supporting mechanisms and algorithms for security and fault-tolerance.

Original languageEnglish
Title of host publicationSecurity and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Revised Selected Papers
Pages67-79
Number of pages13
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2nd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, MobiSec 2010 - Catania, Sicily, Italy
Duration: 27 May 201028 May 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume47 LNICST
ISSN (Print)1867-8211

Conference

Conference2nd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, MobiSec 2010
Country/TerritoryItaly
CityCatania, Sicily
Period27/05/1028/05/10

Keywords

  • Agents
  • Multiple targets
  • Multiple trackers
  • Passive tracking

Fingerprint

Dive into the research topics of 'Algorithms for advanced clandestine tracking in short-range ad hoc networks'. Together they form a unique fingerprint.

Cite this