Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
A survey of trust and reputation systems for online service provision
Decision Support Systems
Performance modeling of epidemic routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
The diameter of opportunistic mobile networks
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Efficient routing in intermittently connected mobile networks: the multiple-copy case
IEEE/ACM Transactions on Networking (TON)
ACM SIGMOBILE Mobile Computing and Communications Review
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
The changing usage of a mature campus-wide wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Inferring Spammers in the Network Core
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Spectral efficiency of mobility-assisted podcasting in cellular networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Cellular traffic offloading through opportunistic communications: a case study
Proceedings of the 5th ACM workshop on Challenged networks
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
SPATE: Small-Group PKI-Less Authenticated Trust Establishment
IEEE Transactions on Mobile Computing
WiFi-Opp: ad-hoc-less opportunistic networking
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks
IEEE Transactions on Mobile Computing
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Bootstrapping opportunistic networks using social roles
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Governments and the executive "internet kill switch" [Editor's Note]
IEEE Network: The Magazine of Global Internetworking
Collection and analysis of multi-dimensional network data for opportunistic networking research
Computer Communications
An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks
IEEE Transactions on Mobile Computing
Hi-index | 0.24 |
In case of a network outage or strict censorship, opportunistic networking is an appealing solution to uphold communications. News such as tweets or videos can be disseminated widely in an epidemic and delay-tolerant fashion between mobile phones. Yet, the cooperative nature of such networks can be abused to disseminate unsolicited content at no cost. Aside from harassing other users with spam, this behavior consumes scarce resources such as battery power. Opportunistic networks' challenging features, such as its highly dynamic node contacts, render traditional decentralized trust and reputation frameworks insufficient. They mainly fail at the 'Cold Start Problem' when mobile users find themselves in a new surrounding without established trust or reputation available, a frequent phenomena in opportunistic networks. To overcome these challenges we propose Trust-Based Spreading (TBS) - a scheme where trusted nodes collaborate and filter spam by opportunistically exchanging assessments to promote or block the spreading of content. TBS copes with the 'Cold Start Problem' by allowing the trust structure to be initialized randomly and being extremely resilient to false positives in the feedback process. We evaluate TBS by replaying a variety of real-world mobility traces and show that TBS disseminates legitimate content almost as effectively as classical epidemic spreading, while significantly limiting the reach of spam.