IIT Home Page CNR Home Page

Private mobility-cast for opportunistic networks

n this paper, we introduce the notion of mobility-cast in opportunistic networks, according to which a message sent by a user S is delivered to users with a mobility pattern similar to that of S – collec- tively named place-friends. Motivation for delivering a message to place-friends stems from the fact that current social acquaintances are likely to be place-friends. Most importantly, it has been recently found that a large fraction of new social contacts come from place-friends. After introducing mobility-cast, we present a privacy-preserving mobile-cast protocol based on secure two-party computation. The effective- ness of the protocol in delivering messages to place-friends is demonstrated by means of analysis and extensive simulations based on a realistic mobility model. In the last part of the paper, we present two alternative implementations of mobility-cast on the Android platform, and test their computational per- formance on a number of different smartphones. Overall, the results presented in this paper show that privacy-preserving mobility-cast can be effectively implemented with current mobile phone technology.

Computer Networks, 2017

External authors: Rajib Maiti (SUTD)
IIT authors:

Type: Contributo in rivista ISI
Field of reference: Computer Science & Engineering

File: ComNetCR.pdf
Da pagina 28 a pagina 42

Activity: Algoritmica per reti wireless
Wireless Network Security
Sicurezza di dispositivi mobili