The official PGP user's guide
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Know thy neighbor: towards optimal mapping of contacts to social graphs for DTN routing
INFOCOM'10 Proceedings of the 29th conference on Information communications
WiFi-Opp: ad-hoc-less opportunistic networking
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
Twitter in disaster mode: opportunistic communication and distribution of sensor data in emergencies
Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Twitter in disaster mode: smart probing for opportunistic peers
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
CrowdShare: secure mobile resource sharing
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Adaptive role switching for fair and efficient battery usage in device-to-device communication
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
Recent natural disasters (earthquakes, floods, etc.) have show that people heavily use platforms like Twitter to communicate and organize in emergencies. However, the fixed infrastructure supporting such communications may be temporarily wiped out. In such situations, the phones' capabilities of infrastructure-less communication can fill in: By propagating data opportunistically (from phone to phone), tweets can still be spread, yet at the cost of delays. In this paper, we present Twimight and its network security extensions. Twimight is an open source Twitter client for Android phones featured with a "disaster mode", which users enable upon losing connectivity. In the disaster mode, tweets are not sent to the Twitter server but stored on the phone, carried around as people move, and forwarded via Bluetooth when in proximity with other phones. However, switching from an online centralized application to a distributed and delay-tolerant service relying on opportunistic communication requires rethinking the security architecture. We propose security extensions to offer comparable security in the disaster mode as in the normal mode to protect Twimight from basic attacks. We also propose a simple, yet efficient, anti-spam scheme to avoid users from being flooded with spam. Finally, we present a preliminary empirical performance evaluation of Twimight.