• DocumentCode
    705778
  • Title

    Social power for privacy protected opportunistic networks

  • Author

    Distl, Bernhard ; Neuhaus, Stephan

  • Author_Institution
    Commun. Syst. Group, ETH Zurich, Zurich, Switzerland
  • fYear
    2015
  • fDate
    6-10 Jan. 2015
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.
  • Keywords
    computer network security; data protection; data structures; smart phones; social networking (online); anonymous environment; friendship detection time; hash-based approach; identity protection; preestablished social links; privacy protected opportunistic networks; private information protection; smartphone application; Privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Systems and Networks (COMSNETS), 2015 7th International Conference on
  • Conference_Location
    Bangalore
  • Type

    conf

  • DOI
    10.1109/COMSNETS.2015.7098697
  • Filename
    7098697