skip to main content
10.1145/2046614.2046627acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Short paper: can your phone trust your friend selection?

Published:17 October 2011Publication History

ABSTRACT

In ad hoc communication, data packets are relayed over several hops before reaching their destination. Spontaneous communication requires that nodes trust each other as communication can be intentionally disturbed or privacy compromised by the intermediate nodes. Establishing this trust relationship within a MANET without access to a central authority poses a challenge. In this work, we discuss the problem of ad hoc trust assignment and present an approach that helps to establish trust relationships between smartphones forming a MANET. Inspired by sociological insights we argue that data inherently available at mobiles can be used to define the social relationship of two individuals. Based on a preliminary measurement-based analysis we show that this data can give an initial estimation of trust between two users and their mobiles.

References

  1. M. S. Granovetter, "The Strength of Weak Ties," The American Journal of Sociology, vol. 78, no. 6, pp. 1360--1380, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  2. L. A. Renzulli and H. Aldrich, "Who Can You Turn To? Tie Activation within Core Business Discussion Networks," Social Forces, vol. 84, no. 1, pp. 323--341, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  3. D. G. Murray, E. Yoneki, J. Crowcroft, and S. Hand, "The Case for Crowd Computing," in Proc. of the 2nd ACM SIGCOMM MobiHeld Workshop. New York, NY, USA: ACM, 2010, pp. 39--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin, "A First Look at Traffic on Smartphones," in Proc. of the 10th IMC. New York, NY, USA: ACM, 2010, pp. 281--287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Ford, C. Raiciu, M. Handley, S. Barre, and J. Iyengar, "Architectural Guidelines for Multipath TCP Development," IETF, RFC 6182, March 2011.Google ScholarGoogle Scholar
  6. S. Barre, O. Bonaventure, C. Raiciu, and M. Handley, "Experimenting with Multipath TCP," in Proc. of the ACM SIGCOMM 2010 Conference. New York, NY, USA: ACM, 2010, pp. 443--444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta, and P. Dhurandher, "Faces: Friend-based ad hoc routing using challenges to establish security in manets systems," Systems Journal, IEEE, vol. 5, no. 2, pp. 176--188, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  8. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs," in Collaborative Computing: Networking, Applications and Worksharing, ser. Lecture Notes of ICST. Springer Berlin Heidelberg, 2009, vol. 10, pp. 696--714.Google ScholarGoogle Scholar
  9. Z. Zhang, P.-H. Ho, and F. Naït-Abdesselam, "Radar: A reputation-driven anomaly detection system for wireless mesh networks," Wirel. Netw., vol. 16, no. 8, pp. 2221--2236, November 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of the 6th ACM MobiCom, New York, NY, USA, ACM, 2000, pp. 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Gilbert and K. Karahalios, "Predicting tie strength with social media," in Proc. of the 27th ACM CHI Conference. New York, ACM, 2009, pp. 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Banford, A. McDiarmid, and J. Irvine, "Estimating the Strength of Ties in Communication Networks with a Small Number of Users," 6th Intl. Conf on Wireless and Mobile Communications, pp. 191--195, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. A. Huberman, M. Franklin, and T. Hogg, "Enhancing privacy and trust in electronic communities," in Proc. of the 1st ACM Conf. on Electronic Commerce, ACM, 1999, pp. 78--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "Veneta: Serverless friend-of-friend detection in mobile social networking," in IEEE Intl. Conf. on Wireless and Mobile Computing, October 2008, pp. 184--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Kossinets and D. J. Watts, "Empirical analysis of an evolving social network," Science, vol. 311, no. 5757, pp. 88--90, January 2006.Google ScholarGoogle ScholarCross RefCross Ref
  16. R. Potharaju, B. Carbunar, and C. Nita-Rotaru, "iFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks," in Proc. of the 17th ACM CCS. New York: ACM, 2010, pp. 723--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Eagle, A. S. Pentland, and D. Lazer, "Inferring friendship network structure by using mobile phone data," Proc. of the National Academy of Sciences, vol. 106, no. 36, 2009.Google ScholarGoogle Scholar
  18. N. K. Baym, Y. B. Zhang, and M. C. Lin, "Social interactions across media," New Media & Society, vol. 6, no. 3, pp. 299--318, June 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Short paper: can your phone trust your friend selection?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
        October 2011
        96 pages
        ISBN:9781450310000
        DOI:10.1145/2046614

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 October 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate46of139submissions,33%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader