105,301 research outputs found

    Three applications for mobile epidemic algorithms

    Get PDF
    This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment

    Prevent Privacy Leakage in Mobile Social Networks -- A Privacy Policy Conflict Detection Framework

    Get PDF
    Mobile social networks give online social networking sites the abilities to extend their services to mobile device users. Smart phones and tablets allow users to interact with others when they are moving. Policy-based management simplifies the management of interaction functionalities by establishing policies to control various activities involved in these functionalities. To detect and resolve potential dynamic conflicts between the rules and configurations from different administrative domains, a knowledge-based policy analysis framework is proposed this paper. It incorporates relationships between different elements in policy rules into temporal logic using a semantic extension, which makes dynamic policy conflict analysis more accurate. A prototype system for mobile social networks is implemented to illustrate the capability of this framework

    Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks

    Get PDF
    © 2016 IEEE. Cyber-Attacks are on the rise due to the increased usage of social networking application\u27s built-in Android devices via Wi-Fi connections, which has resulted in privacy issues. Several studies have been conducted to investigate Android phones, however, none of these have proposed a comprehensive Android investigation method, which begins with a Man-in-The-Middle attack and ending in a criminal investigation. The purpose of this research is to propose an Android forensics framework against such Wi-Fi attacks, using advanced forensic tools, such as the Cellebrite Universal Forensic Extraction Device and the Oxygen. This will assist the researcher to prove the suggested arguments in the following: 1. To implement guidelines for the forensic examiners, especially for those new in the field of forensics, and 2. To guide Android and social networking application developers to enhance the level of security. Furthermore, this study recommends the best data extraction methods designed for Android devices

    The impact of ocean acidification on the skeletal ossification in herring larvae (Clupea harengus, L.)

    Get PDF
    In the era of pervasive mobile computing, human encounters can be leveraged to enable new forms of social interactions mediated by the personal devices of individuals. In this framework, emerging needs, such as content dissemination, social discovery and question&answering, advocate the raising of novel communication paradigms where the binding content-recipients is not provided by the sender (in the classical IP addressing style), but directly executed by specific recipients with interest on it. This allows tagged contents to be freely advertised on the network according to a content-driven approach; human encounters drive the information towards potential recipients that extract it from the stream when content type and personal interest match. This very active research area has recently produced a few preliminary solutions to this networking problem; they inherently confine message delivery inside a specific location and/or community. This covers only a part of users needs, as emerging from everyday life experience and recent studies in human sciences. This paper proposes a novel communication protocol, named InterestCast, or I Cast, solving the problem for a wide range of social scenarios and applying to a delay tolerant ad hoc network whose nodes are the personal device of moving individuals, possibly interacting with fixed road-side devices. The protocol is able to chase users interests decoupling content tags from locations and social communities. The main advantages the proposal achieves are: it ensures remarkable performance results; it is simple and, thus, it is feasible and keeps computational and networking costs low; it preserves users privacy.erant ad hoc network whose nodes are the personal device of moving individuals, possibly interacting with fixed road-side devices. The protocol is able to chase users interests decoupling content tags from locations and social communities. The main advantages the proposal achieves are: it ensures remarkable performance results; it is simple and, thus, it is feasible and keeps computational and networking costs low; it preserves users privacy

    In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network

    Full text link
    Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In this paper, we showcase the Secure Opportunistic Schemes (SOS) middleware which allows different routing schemes to be easily implemented relieving the burden of security and connection establishment. The feasibility of creating a delay tolerant social network is demonstrated by using SOS to power AlleyOop Social, a secure delay tolerant networking research platform that serves as a real-life mobile social networking application for iOS devices. SOS and AlleyOop Social allow users to interact, publish messages, and discover others that share common interests in an intermittent network using Bluetooth, peer-to-peer WiFi, and infrastructure WiFi.Comment: 6 pages, 4 figures, accepted in ICDCS 2017. arXiv admin note: text overlap with arXiv:1702.0565

    Towards Psychometrics-based Friend Recommendations in Social Networking Services

    Full text link
    Two of the defining elements of Social Networking Services are the social profile, containing information about the user, and the social graph, containing information about the connections between users. Social Networking Services are used to connect to known people as well as to discover new contacts. Current friend recommendation mechanisms typically utilize the social graph. In this paper, we argue that psychometrics, the field of measuring personality traits, can help make meaningful friend recommendations based on an extended social profile containing collected smartphone sensor data. This will support the development of highly distributed Social Networking Services without central knowledge of the social graph.Comment: Accepted for publication at the 2017 International Conference on AI & Mobile Services (IEEE AIMS
    • …
    corecore