ABSTRACT
In ad hoc communication, data packets are relayed over several hops before reaching their destination. Spontaneous communication requires that nodes trust each other as communication can be intentionally disturbed or privacy compromised by the intermediate nodes. Establishing this trust relationship within a MANET without access to a central authority poses a challenge. In this work, we discuss the problem of ad hoc trust assignment and present an approach that helps to establish trust relationships between smartphones forming a MANET. Inspired by sociological insights we argue that data inherently available at mobiles can be used to define the social relationship of two individuals. Based on a preliminary measurement-based analysis we show that this data can give an initial estimation of trust between two users and their mobiles.
- M. S. Granovetter, "The Strength of Weak Ties," The American Journal of Sociology, vol. 78, no. 6, pp. 1360--1380, 1973.Google ScholarCross Ref
- L. A. Renzulli and H. Aldrich, "Who Can You Turn To? Tie Activation within Core Business Discussion Networks," Social Forces, vol. 84, no. 1, pp. 323--341, 2005.Google ScholarCross Ref
- D. G. Murray, E. Yoneki, J. Crowcroft, and S. Hand, "The Case for Crowd Computing," in Proc. of the 2nd ACM SIGCOMM MobiHeld Workshop. New York, NY, USA: ACM, 2010, pp. 39--44. Google ScholarDigital Library
- H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin, "A First Look at Traffic on Smartphones," in Proc. of the 10th IMC. New York, NY, USA: ACM, 2010, pp. 281--287. Google ScholarDigital Library
- A. Ford, C. Raiciu, M. Handley, S. Barre, and J. Iyengar, "Architectural Guidelines for Multipath TCP Development," IETF, RFC 6182, March 2011.Google Scholar
- S. Barre, O. Bonaventure, C. Raiciu, and M. Handley, "Experimenting with Multipath TCP," in Proc. of the ACM SIGCOMM 2010 Conference. New York, NY, USA: ACM, 2010, pp. 443--444. Google ScholarDigital Library
- S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta, and P. Dhurandher, "Faces: Friend-based ad hoc routing using challenges to establish security in manets systems," Systems Journal, IEEE, vol. 5, no. 2, pp. 176--188, 2010.Google ScholarCross Ref
- W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs," in Collaborative Computing: Networking, Applications and Worksharing, ser. Lecture Notes of ICST. Springer Berlin Heidelberg, 2009, vol. 10, pp. 696--714.Google Scholar
- Z. Zhang, P.-H. Ho, and F. Naït-Abdesselam, "Radar: A reputation-driven anomaly detection system for wireless mesh networks," Wirel. Netw., vol. 16, no. 8, pp. 2221--2236, November 2010. Google ScholarDigital Library
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of the 6th ACM MobiCom, New York, NY, USA, ACM, 2000, pp. 255--265. Google ScholarDigital Library
- E. Gilbert and K. Karahalios, "Predicting tie strength with social media," in Proc. of the 27th ACM CHI Conference. New York, ACM, 2009, pp. 211--220. Google ScholarDigital Library
- J. Banford, A. McDiarmid, and J. Irvine, "Estimating the Strength of Ties in Communication Networks with a Small Number of Users," 6th Intl. Conf on Wireless and Mobile Communications, pp. 191--195, 2010. Google ScholarDigital Library
- B. A. Huberman, M. Franklin, and T. Hogg, "Enhancing privacy and trust in electronic communities," in Proc. of the 1st ACM Conf. on Electronic Commerce, ACM, 1999, pp. 78--86. Google ScholarDigital Library
- M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "Veneta: Serverless friend-of-friend detection in mobile social networking," in IEEE Intl. Conf. on Wireless and Mobile Computing, October 2008, pp. 184--189. Google ScholarDigital Library
- G. Kossinets and D. J. Watts, "Empirical analysis of an evolving social network," Science, vol. 311, no. 5757, pp. 88--90, January 2006.Google ScholarCross Ref
- R. Potharaju, B. Carbunar, and C. Nita-Rotaru, "iFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks," in Proc. of the 17th ACM CCS. New York: ACM, 2010, pp. 723--725. Google ScholarDigital Library
- N. Eagle, A. S. Pentland, and D. Lazer, "Inferring friendship network structure by using mobile phone data," Proc. of the National Academy of Sciences, vol. 106, no. 36, 2009.Google Scholar
- N. K. Baym, Y. B. Zhang, and M. C. Lin, "Social interactions across media," New Media & Society, vol. 6, no. 3, pp. 299--318, June 2004.Google ScholarCross Ref
Index Terms
- Short paper: can your phone trust your friend selection?
Recommendations
The influence of eWOM communications
Drawing on Online Social Network (OSN) Framework (Brown, Boderick, & Lee, 2007), this study examines the role of electronic word-of-mouth (eWOM) in consumer review websites by investigating its effects on the decision-making process of consumers. OSN ...
Short Paper: Fellowship in Mobile Ad hoc Networks
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications NetworksSecurity issues are paramount in mobile ad hoc networks even more so than in wired networks. Though there have been many works in the recent years on secure routing protocols for mobile ad hoc networks still ad hoc networks are prone to specific attacks ...
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computingOn demand routing protocols provide scalable and cost-effective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate far from the optimal because of the lack of knowledge about the global ...
Comments