FACE TRANSITION: Obtaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks
Keywords:
Mobile opportunistic social networks, anonymity, encountering information.Abstract
In mobile opportunistic social networks (MOSNs), mobile devices carried by people communicate with each other directly when they meet for proximity-based MOSN services (e.g., file sharing) without the support of infrastructures. In current methods, when nodes meet, they simply communicate with their real IDs, which leads to privacy and security concerns. Anonymizing real IDs among neighbor nodes solves such concerns. However, this prevents nodes from collecting real ID-based encountering information, which is needed to support MOSN services. In Face Change, each node continually changes its pseudonyms and parameters when communicating with neighbors nodes to hide its real ID
References
- M K. F. Dan Boneh, “Identity-based encryption from the weil pairing,” in Proc. CRYPTO, 2001, pp. 213–229.
- A C. Yao, “Protocols for secure computations,” in Proc. FOCS, Washington, DC, USA, Nov. 1982, pp. 160–164.
- F Li and J. Wu, “MOPS: Providing content-based service in disruption tolerant networks,” in Proc. IEEE ICDCS, Jun. 2009, pp. 526–533.
- M Motani, V. Srinivasan, and P. S. Nuggehalli, “People Net: Engineering a wireless virtual social network,” in Proc. MOBICOM, 2005,pp. 243–257.
- G Costantino, F. Martinelli, and P. Santi, “Privacy-preserving interest casting in opportunistic networks,” in Proc. IEEE WCNC, Apr. 2012,pp. 2829–2834.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.