Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2414393.2414406acmotherconferencesArticle/Chapter ViewAbstractPublication PagesextremecomConference Proceedingsconference-collections
research-article

FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities

Published: 26 September 2011 Publication History

Abstract

Pocket Switched Networks (PSN) whose main feature is the social-guided movement of users/devices, have attracted the attention of many researchers in the last years, mostly for the common belief to be a key technology in providing innovative services without the need of a fixed network infrastructure. However, the opportunistic and intermittent nature of the contacts among users make it very difficult to design secure and trustworthy services for these networks. In particular, anonymous communication remains among the most difficult services to achieve.
In this paper we present FAN (Friendship based ANonymity), a primitive that exploits strong friendship relationships among users to provide source anonymity and sender-receiver unlinkability in Pocket Switched Networks. The primitive is independent of the forwarding mechanism underneath, and therefore, can be coupled with any routing protocol. As shown from our large experimental results with different real data traces, FAN outperforms the TPS scheme, its only rival that provides the same anonymity properties for Pocket Switched Networks, in terms of delay, cost, and network throughput.

References

[1]
M. V. Barbera and A. Mei. Personal marks and community certificates: Detecting clones in mobile wireless networks of smart-phones. Preprint: http://arxiv.org/abs/1105.3716, 2011.
[2]
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN04), 2004.
[3]
R. M. Capocelli, A. D. Santis, L. Gargano, and U. Vaccaro. On the size of shares for secret sharing schemes. Journal of Cryptology, 6:157--168.
[4]
M. Carpentieri, A. D. Santis, U. Vaccaro, A. De, and S. U. Vaccaro. Size of shares and probability of cheating in threshold schemes. In In Proc. of Eurocrypto'93, Lecture Notes in Computer Science, LNCS 765, pages 118--125. Springer-Verlag, 1993.
[5]
L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24:84--90, February 1981.
[6]
E. M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. In MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, 2007.
[7]
R. Dingledine, N. Mathewson, and P. P. Syverson. Tor: the second-generation onion router. In Proceedings of the 13th conference on USENIX Security Symposium (SSYM'04), 2004.
[8]
N. Eagle and A. S. Pentland. CRAWDAD data set mit/reality (v. 2005-07-01). Downloaded from http://crawdad.cs.dartmouth.edu/mit/reality, July 2005.
[9]
V. Erramilli, M. Crovella, A. Chaintreau, and C. Diot. Delegation forwarding. In MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, 2008.
[10]
P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In WDTN '05: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, 2005.
[11]
P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, 2008.
[12]
R. Jansen and R. Beverly. Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme. In Proceedings of The Military Communications Conference (MILCOM 2010).
[13]
D. Kotz, T. Henderson, I. Abyzov, and J. Yeo. CRAWDAD data set dartmouth/campus (v. 2009-09-09). Downloaded from http://crawdad.cs.dartmouth.edu/dartmouth/campus, Sept. 2009.
[14]
F. Li and J. Wu. LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks. In SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.
[15]
A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, 2008.
[16]
X. Lu, P. Hui, D. Towsley, J. Pu, and Z. Xiong. Anti-localization anonymous routing for delay tolerant network. Computer Networks, 54(11):1899--1910, 2010.
[17]
A. Mei, G. Morabito, P. Santi, and J. Stefa. Social-Aware Stateless Forwarding in Pocket Switched Networks. In Proceedings of The 30th IEEE Conference on Computer Communications, mini-conference, (INFOCOM 2011), April 2011.
[18]
G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043), 2005.
[19]
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau. CRAWDAD trace cambridge/haggle/imote (v. 2009-05-29). Downloaded from http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote, May 2009.
[20]
S. Seys and B. Preneel. ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wire. Mob. Comput., 3:145--155, October 2009.
[21]
A. Shamir. How to share a secret. Communications of the ACM, 11(22):612--613, 1979.
[22]
R. Song, L. Korba, and G. Yee. Anondsr: efficient anonymous dynamic source routing for mobile ad-hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN'05), 2005.
[23]
T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In ACM Sigcomm Workshops, Aug. 2005.
[24]
A. Vahdat and D. Becker. Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University, 2000.
[25]
Y. Zhang, W. Liu, W. Lou, and Y. Fang. MASK: Anonymous on-demand routing in mobile ad hoc networks. IEEE Transactions on Wireless Communications, 21:2376--2385, 2006

Cited By

View all
  • (2013)Preserving Smartphone Users' Anonymity in Cloudy Days2013 22nd International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2013.6614170(1-5)Online publication date: Jul-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ExtremeCom '11: Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
September 2011
79 pages
ISBN:9781450310796
DOI:10.1145/2414393
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • UFAM: Federal University Of Amazonas
  • CAPES: Brazilian Higher Education Funding Council

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DTNs
  2. anonymous routing
  3. pocket switched networks

Qualifiers

  • Research-article

Conference

ExtremeCom 2011
Sponsor:
  • UFAM
  • CAPES

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Preserving Smartphone Users' Anonymity in Cloudy Days2013 22nd International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2013.6614170(1-5)Online publication date: Jul-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media