Privacy-enhanced social network routing in opportunistic networks

Iain Siraj Parris, Gregory John Bigwood, Tristan Nicholas Hoang Henderson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. Forwarding messages in such a network often involves the use of social network routing-sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast these social networks, which introduces privacy concerns. This paper introduces two methods for enhancing privacy in social network routing by obfuscating the social network graphs used to inform routing decisions. We evaluate these methods using two real-world datasets, and find that it is possible to obfuscate the social network information without leading to a significant decrease in routing performance.
Original languageEnglish
Title of host publicationProceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
Subtitle of host publicationIEEE International Workshop on Security and Social Networking (SESOC 2010)
PublisherIEEE Computer Society
Pages624-629
ISBN (Print)978-1-4244-6605-4
DOIs
Publication statusPublished - Mar 2010
Event2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) - Mannheim, Germany
Duration: 29 Mar 20102 Apr 2010

Conference

Conference2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
Country/TerritoryGermany
CityMannheim
Period29/03/102/04/10

Keywords

  • Ad hoc networks
  • Data privacy
  • Message passing
  • Mobile radio
  • Social networking
  • Telecommunication security

Fingerprint

Dive into the research topics of 'Privacy-enhanced social network routing in opportunistic networks'. Together they form a unique fingerprint.

Cite this