Communications of the ACM
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Locating cache proxies in manets
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Analysis and implications of student contact patterns derived from campus schedules
Proceedings of the 12th annual international conference on Mobile computing and networking
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Pervasive and Mobile Computing
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs
IEEE Transactions on Mobile Computing
The ONE simulator for DTN protocol evaluation
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
PEON: privacy-enhanced opportunistic networks with applications in assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
SimBetAge: utilizing temporal changes in social networks for pocket switched networks
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Peoplerank: social opportunistic forwarding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy and confidentiality in context-based and epidemic forwarding
Computer Communications
A Practical Attack to De-anonymize Social Network Users
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Practical privacy-aware opportunistic networking
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
Adaptive user anonymity for mobile opportunistic networks
Proceedings of the seventh ACM international workshop on Challenged networks
Ego network models for Future Internet social networking environments
Computer Communications
GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms
Proceedings of the 2013 Summer Computer Simulation Conference
Hi-index | 0.25 |
An opportunistic network of mobile nodes can be created when mobile devices work together to create an ad hoc store-and-forward architecture, with messages forwarded via intermediary encountered nodes. Social-network routing has been proposed to route messages in such networks: messages are sent via nodes in the sender's or recipient's friends list. Simple social-network routing, however, may broadcast these friends lists, which introduces privacy concerns. This paper studies mechanisms for enhancing privacy while using social-network routing. We first present a threat analysis of the privacy risks in social-network routing, and then introduce two complementary methods for enhancing privacy in social-network routing by obfuscating the friends lists used to inform routing decisions. We evaluate these methods using three real-world datasets, and find that it is possible to obfuscate the friends lists without leading to a significant decrease in routing performance, as measured by delivery cost, delay and ratio. We quantify the increase in security provided by this obfuscation, with reference to the classes of attack which are mitigated.