DocumentCode
705778
Title
Social power for privacy protected opportunistic networks
Author
Distl, Bernhard ; Neuhaus, Stephan
Author_Institution
Commun. Syst. Group, ETH Zurich, Zurich, Switzerland
fYear
2015
fDate
6-10 Jan. 2015
Firstpage
1
Lastpage
8
Abstract
Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.
Keywords
computer network security; data protection; data structures; smart phones; social networking (online); anonymous environment; friendship detection time; hash-based approach; identity protection; preestablished social links; privacy protected opportunistic networks; private information protection; smartphone application; Privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Systems and Networks (COMSNETS), 2015 7th International Conference on
Conference_Location
Bangalore
Type
conf
DOI
10.1109/COMSNETS.2015.7098697
Filename
7098697
Link To Document