2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010
DOI: 10.1109/percomw.2010.5470511
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhanced social network routing in opportunistic networks

Abstract: Abstract-Opportunistic networking -forwarding messages in a disconnected mobile ad hoc network via any encountered nodes -otters a new mechanism for exploiting the mobile devices that many users already carry. Forwarding messages in such a network often involves the use of social network routing-sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast these social networks, which introduces privacy concerns. This paper introduces two methods … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…For example, in Pocketswitched Networks [5], a mobile phone carried by a person is associated with that person identity and the detection of this mobile phone location at different times is almost equivalent to tracking its owner. Parris et al [12] propose using obfuscation of user's own social network exchanged as part of the social-forwarding protocol in DTN, by altering or hiding the social network information, in order to prevent the attacker from inferring any physical proximity between nodes on the message delivery path. These techniques affect forwarding but are not applicable when the node has to access LBS and provide location information for the request to be answered correctly.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in Pocketswitched Networks [5], a mobile phone carried by a person is associated with that person identity and the detection of this mobile phone location at different times is almost equivalent to tracking its owner. Parris et al [12] propose using obfuscation of user's own social network exchanged as part of the social-forwarding protocol in DTN, by altering or hiding the social network information, in order to prevent the attacker from inferring any physical proximity between nodes on the message delivery path. These techniques affect forwarding but are not applicable when the node has to access LBS and provide location information for the request to be answered correctly.…”
Section: Related Workmentioning
confidence: 99%
“…We use real-world SASSY [12] dataset contributed by Bigwood et al, where they have recorded the mobile encounters of 27 participants (22 undergraduate students, 3 post-graduate students and 2 staff members) carrying T-mote sensor nodes in their day-to-day life activities over the period of three months. The range of these devices was about 10m, and encounters were uploaded to a base-station regularly.…”
Section: ) Real-world Connectivity Data Traces With Socaillinksmentioning
confidence: 99%
“…The work by Parris et al [15] is concerned with another security aspect of DTN namely user privacy, where they proposed a technique to hide the social contacts of nodes. Rongxing et al [10] proposed a privacy preserving protocol for VANET, where a number of predetermined trusted Road Side Units (RSUs) acted as a middle-man to help achieve source/destination anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…Rongxing et al [10] proposed a privacy preserving protocol for VANET, where a number of predetermined trusted Road Side Units (RSUs) acted as a middle-man to help achieve source/destination anonymity. Both [15] and [10] address different challenges in Social Opportunistic networks and VANET respectively in specific classes of DTN network and do not focus on malicious behavior aimed at disrupting communication. [16] proposed using a watchdog technique in MANET to detect and isolate misbehaving nodes using EC, where intermediaries check passing messages in order to detect such behavior and inform other nodes.…”
Section: Related Workmentioning
confidence: 99%
“…We augment our previous paper [1] with extended evaluations using additional datasets, and we discuss linkability and eavesdropping attacks against our schemes. The paper is outlined as follows.…”
Section: Introductionmentioning
confidence: 99%