DocumentCode
266804
Title
Privacy in opportunistic network contact graphs
Author
Distl, Bernhard ; Hossmann, Theus
Author_Institution
Commun. Syst. Group, ETH Zurich, Zurich, Switzerland
fYear
2014
fDate
19-19 June 2014
Firstpage
1
Lastpage
3
Abstract
Opportunistic networks are formed by people carrying mobile devices with wireless capabilities. When in mutual transmission range, the nodes of such networks use device-to-device communication to automatically exchange data, without requiring fixed infrastructure. To solve challenging opportunistic networking problems like routing, nodes exchange information about whom they have met in the past and form a contact graph, which encodes the social structure of past meetings. This contact graph is then used to assign a utility to each node (e.g., based on their centrality), thereby defining a ranking of the nodes´ values for carrying a message. However, while being a useful tool, the contact graph represents a privacy risk to the users, as it allows an attacker to learn about social links. In this paper, we investigate the trade-off of privacy and utility in the contact graph. By transforming the graph through adding and removing edges, we are able to control the amount of link privacy. The evaluation of a greedy approach shows that it maintains the node ranking very well, even if many links are changed.
Keywords
data privacy; graph theory; mobile computing; smart phones; telecommunication network routing; link privacy; node ranking; opportunistic network contact graphs; opportunistic network routing; past meeting recording; privacy risk; social structure recording; Approximation algorithms; Correlation; Greedy algorithms; Measurement; Mobile handsets; Privacy; Routing;
fLanguage
English
Publisher
ieee
Conference_Titel
World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a
Conference_Location
Sydney, NSW
Type
conf
DOI
10.1109/WoWMoM.2014.6919020
Filename
6919020
Link To Document