20,749 research outputs found
The Power of Hood Friendship for Opportunistic Content Dissemination in Mobile Social Networks
We focus on dissemination of content for delay tolerant applications/services, (i.e. content sharing, advertisement propagation, etc.) where users are geographically clustered into communities. Due to emerging security and privacy related issues, majority of users are only willing to share information/content with the users who are previously identified as friends. In this environment, opportunistic communication will not be effective due to the lack of known friends within the communication range. In this paper, we propose a novel architecture that addresses the issues of lack of trust, timeliness of delivery, loss of user control, and privacy-aware distributed mobile social networking by combining the advantages of distributed decentralised storage and opportunistic communications. We formally define a content replication problem in mobile social networks and show that it is computationally hard to solve optimally. Then, we propose a community based greedy heuristic algorithm with novel dynamic centrality metrics to replicate content in well-selected users, to maximise the content dissemination with limited number of replication. Using both real world and synthetic traces, we show that content replication can attain a large coverage gain and reduce the content delivery latency
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance
Recommended from our members
Efficient geocasting in opportunistic networks
With the proliferation of smartphones and their advanced connectivity capabilities, opportunistic networks have gained a lot of traction during the past years; they are suitable for increasing network capacity and sharing ephemeral, localised content. They can also offload traffic from cellular networks to device-to-device ones, when cellular networks are heavily stressed. Opportunistic networks can play a crucial role in communication scenarios where the network infrastructure is inaccessible due to natural disasters, large-scale terrorist attacks or government censorship. Geocasting, where messages are destined to specific locations (casts) instead of explicitly identified devices, has a large potential in real world opportunistic networks, however it has attracted little attention in the context of opportunistic networking.
In this paper we propose Geocasting Spray And Flood (GSAF), a simple and efficient geocasting protocol for opportunistic networks. GSAF follows an elegant and flexible approach where messages take random walks towards the destination cast. Messages that are routed away from the destination cast are extinct when devices’ buffers get full, freeing space for new messages to be delivered. In GSAF, casts do not have to be pre-defined; instead users can route messages to arbitrarily defined casts. GSAF does that in a privacy-preserving fashion. We also present DA-GSAF, a Direction-Aware extension of GSAF in which messages are forwarded to encountered nodes based on whether a node is moving towards their destination cast. In DA-GSAF only the direction of a mobile node is revealed to other devices. We experimentally evaluate our protocols and compare their performance to prominent geocasting protocols in a very wide set of scenarios, including different maps, mobility models and user populations. Both GSAF and DA-GSAF perform significantly better compared to all other studied protocols, in terms of message delivery ratio, latency and network overhead. DA-GSAF is particularly efficient in sparse scenarios minimising network overhead compared to all other studied protocols. Both GSAF and DA-GSAF perform very well for a wide range of device/user populations indicating that our proposal is viable for crowded and sparse opportunistic networks
In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network
Over the past decade, online social networks (OSNs) such as Twitter and
Facebook have thrived and experienced rapid growth to over 1 billion users. A
major evolution would be to leverage the characteristics of OSNs to evaluate
the effectiveness of the many routing schemes developed by the research
community in real-world scenarios. In this paper, we showcase the Secure
Opportunistic Schemes (SOS) middleware which allows different routing schemes
to be easily implemented relieving the burden of security and connection
establishment. The feasibility of creating a delay tolerant social network is
demonstrated by using SOS to power AlleyOop Social, a secure delay tolerant
networking research platform that serves as a real-life mobile social
networking application for iOS devices. SOS and AlleyOop Social allow users to
interact, publish messages, and discover others that share common interests in
an intermittent network using Bluetooth, peer-to-peer WiFi, and infrastructure
WiFi.Comment: 6 pages, 4 figures, accepted in ICDCS 2017. arXiv admin note: text
overlap with arXiv:1702.0565
HotMobile 2008: Postconference Report
HotMobile 2008 presented a two-day program on mobile computing systems and applications. The authors focuses on the sessions on sensors, modularity, wireless, security, systems, and screens. The mobile device is the most amazing invention in history and that it has had the largest impact on human kind. Because mobile phones combine mobile devices with ongoing developments in software and communication technologies, they have the potential to change the way people think and act
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
The enforcement of sensitive policies in untrusted environments is still an
open challenge for policy-based systems. On the one hand, taking any
appropriate security decision requires access to these policies. On the other
hand, if such access is allowed in an untrusted environment then confidential
information might be leaked by the policies. The key challenge is how to
enforce sensitive policies and protect content in untrusted environments. In
the context of untrusted environments, we mainly distinguish between outsourced
and distributed environments. The most attractive paradigms concerning
outsourced and distributed environments are cloud computing and opportunistic
networks, respectively.
In this dissertation, we present the design, technical and implementation
details of our proposed policy-based access control mechanisms for untrusted
environments. First of all, we provide full confidentiality of access policies
in outsourced environments, where service providers do not learn private
information about policies. We support expressive policies and take into
account contextual information. The system entities do not share any encryption
keys. For complex user management, we offer the full-fledged Role-Based Access
Control (RBAC) policies.
In opportunistic networks, we protect content by specifying expressive
policies. In our proposed approach, brokers match subscriptions against
policies associated with content without compromising privacy of subscribers.
As a result, unauthorised brokers neither gain access to content nor learn
policies and authorised nodes gain access only if they satisfy policies
specified by publishers. Our proposed system provides scalable key management
in which loosely-coupled publishers and subscribers communicate without any
prior contact. Finally, we have developed a prototype of the system that runs
on real smartphones and analysed its performance.Comment: Ph.D. Dissertation. http://eprints-phd.biblio.unitn.it/1124
- …