Sie sind auf Seite 1von 9

A Scalable Approach for Achieve the Anonymity of the Neighboring

Node in mobile social networks


ABSTRACT specifically without the help of infrastructures
when they meet (i.e., inside the communication
Social Anonymity is a serious threat to users of
scope of each other) opportunistically. Such a
mobile social networks. Anonymizing genuine
communication model can be used to help
IDs among neighbor nodes explains such
different applications without infrastructures,
concerns. Be that as it may, this prevents nodes
such as packet routing between portable nodes,
from gathering genuine ID-based encountering
encountering based social group/relationship
data, which is expected to help mobile
recognition, and circulated document sharing
opportunistic social networks services. Along
and Question and Answer (Q&A) in a group. In
these lines, in this paper, we propose scalable
every framework, a node is exceptionally named
fine grained approach that can support both
by a constant ID (characterized genuine ID),
anonymizing genuine IDs among neighbor
which is gained from the put stock in Trusted
nodes furthermore, collecting genuine ID-based
Authority (TA), for the comparing service. Since
encountering data. For node anonymity, two
those services are based upon node
encountering nodes communicate anonymously.
encountering, nodes need to gather genuine ID
Only when the two nodes disconnect with each
based encountering information. In current
other, every node sends encrypted encountering
mobile online social networks applications,
evidence to the encountered node to enable
nodes can gather genuine ID based encountering
encountering data collection. A collection of
data effortlessly since neighbor nodes speak
novel methods are intended to guarantee the
with genuine IDs specifically. We characterize
confidentiality and uniqueness of encountering
two nodes as neighbor nodes when they are
proofs. A scalable approach additionally
inside the communication range of each other.
supports fine-grained control over what data is
Be that as it may, when utilizing genuine IDs
shared to the encountered node in light of
straightforwardly, the disclosure of node ID to
attribute similarity (i.e., trust), which is
neighbor nodes would make security what’s
measured without revealing attributes.
more, security concerns. For instance, an
Keywords: Mobile opportunistic social
attacker node would first be able to know the
networks, anonymity, encountering information.
IDs of some central nodes or nodes with
I. INTRODUCTION particular interests. At that point, as appeared in
Figure 1(a), when neighbor nodes communicate
In Online Social Networks, user device carried
with genuine IDs, an attacker node can without
by individuals communicate with each other
much of a stretch identify attack focuses from of the encountering proof should be guaranteed.
neighbors and dispatch attacks to corrupt the An encountering proof must be accessed to by
framework performance or take essential its creator and beneficiary and can't be forged.
documents. Further, without protection, (b) An encountering proof should be fruitful
malicious nodes can likewise easily sense the delivered to its beneficiary notwithstanding
encountering between nodes for attacks. when the genuine ID of the beneficiary node is
Therefore, neighbor node secrecy is expected to unknown because of neighbor node anonymity.
prevent the exposure of genuine IDs to (c) When making an encountering proof, a node
neighbors. Unmistakably, a present pseudonym can control what substance (e.g., fundamental
cannot achieve such an objective since it can be encountering data and application data) to be
connected to a node, which can at present included in light of its trust on the encountering
empower attacker’s nodes to identify targets node. The calculation of the trust should be
from neighbor nodes. Accordingly, a natural privacy preserving.
technique to understand the neighbor node
II. IMPLEMENTATION
anonymity is to let every node constantly change
its pseudonym in the communication with System Setup Model
neighbors, as appeared in Figure 1(b). In any
We concentrate on a mobile opportunistic social
case, when neighbor node anonymity is upheld,
network with m human carried user devices,
nodes can't gather the genuine ID based
signified by Ni (I ∈ [1, m]). We assume that the
encountering data, which disables previously
system is large. Something else, a node can
mentioned MOSN services. Figure 2 represents
without much of a stretch figure the identities of
the plan of Face Change. Whenever two nodes
its neighbors. Mobile nodes take after the
meet, they communicate anonymously. In any
versatility of people carrying them to move in
case, each of them makes an encountering proof
the network system. Every node has a
that contains their genuine IDs. The
constrained communication range, and two
encountering proofs are sent to the next node
nodes can communicate as it were when they are
just when they isolated, in this way empowering
inside the communication scope of each other.
the encountering data collection while keeping
Upon the bootstrap of the framework, the TA
the anonymity during the encountering. For an
initially creates parameters for the received
encountering proof, we call the node that makes
bilinear pairing, i.e., BiParas. TA also chooses a
it as the creator and the encountered node that is
protected commutative encryption algorithm E
to get it as the beneficiary. Face Change needs to
() and a collision resistant hashing function H (),
deal with the traceing difficulties for
which are utilized for encountering proof
encountering data accumulation. (a) The security
encryption. Furthermore, TA creates a couple of that anonymity of neighbor node is kept up in
public key and private key ( PK T , SK T ) these procedures. For simple scenario, we utilize

through people in public key cryptography, e.g., PIDi to consistently describe to node N i's pen
RSA. At last, TA produces the framework names NID i to represent to its novel genuine ID.
parameter SysPara = (BiParas, E (), H (), PKT),
where BiParas speaks to the bilinear pairing Goals on Encountering Information Collection

parameters When a node N i participates in the In our proposed system, neighbor nodes
framework, it registers to the TA through the communicate anonymously to secure their
traceing stages: (A) N imakes a couple of protection. In any case, Online Mobile Social

public/private key ( PK i, SK i) by a similar Networks services require the genuine ID based


encountering data. To understand such a issue,
technique utilized by TA and reports PK i to TA.
every node makes an reencountering proof for
(B) N i Brings the framework parameter SysPara
the other to take in the encountering data (e.g.,
and its interesting genuine ID NID i from TA. whom it has met), as appeared in Figure 1(a). To
guarantee neighbor anonymity, the encountering
Anonymity of the Neighboring Node
proof is routed to the next node as it were after
Anonymity of the Neighbor node implies that they isolate from each other, as appeared in
every node does not know the genuine IDs of its Figure 1(b).
neighbor nodes. To understand this objective,
Face Change gives every node a chance to
discuss secretly with neighbor nodes. In
particular, at whatever point a node disconnects
with a neighbor node, it randomly changes its
pseudonyms in all communication layers (e.g.,
MAC address, IP address what’s more
pseudonym) communication parameters (e.g., Fig. 1. General solution for encountering record
collection. (a) Create the encountering evidence
signals quality), which will be utilized for the
under neighbor node anonymity. (b) Route the
communication with the next encountered node.
encountering evidence to the other node after
Note that both MAC and IP addresses can be
separation.
effectively altered through programming. Along
these lines, the pseudonym parameters utilized In any case, there are a few difficulties in this
by a node are non-linkable. We facilitate solution. Initially, the security of encountering
carefully plan the encountering proof generation proofs should be guaranteed against security
and accumulation in Face Change to guarantee leakage and creation during the dynamic routing.
Secondly, the encountering proof should be sent to the evidence maker N i. At that point,
effectively what’s more, exceptionally collected. after the two nodes disconnect, the maker routes
Third, while making an encountering proof, a the encountering proof to the relay node, which
node might need to control the content in the initially decrypts the beneficiary node's genuine
evidence in light of its trust on the encountering ID and afterward routes the evidence to the
node. beneficiary node. Figure 2 shows this plan.

Encountering Evidence Encryption and


Validation

At the point when N imeets N j, it makes an

encountering proof for N j, meant by ev iij (t), to


record their encountering. We present the
encountering proof creation process later. N jAt
Fig. 2. Relaying encountering evidence to the
that point courses EV ij (t) to N j after it
recipient. (a) Select the relay node. (b) Relay to the
disconnects with N j .Since the proof is routed recipient.
by nodes in the network organization, its
Whenever Bob and Tom meets, Tom advises
security and secrecy should be guaranteed. In
Bob that the encountering proof should be
the tracing, we initially present the detail of the
relayed by Alice and additions its genuine ID
proposed plan and after that present the security
inside the envelope. His genuine ID must be
and cost examination.
seen by Alice and can't be seen by Bob. At that
Encountering Evidence Relaying Scheme point, when Alice gets it, as appeared in Figure
2(b), it finds that the beneficiary is Tom and
After detaching with N j , N i routes the
routes the encountering proof to Tom. The two
generated encountering proof to N j . Be that as clouds in Figure 2(b) imply that the message is
it may, because of node anonymity, N i can't directed by nodes in the network framework.
know the genuine ID of N j, which is the
Encountering Evidence Generation Scheme
beneficiary of the evidence. We propose an
encountering proof relay scheme to take care of We proposed how to make encountering proof
this issue. In this plan, during the encountering, when two nodes meet in a protection saving way

the beneficiary node N jindicates a hand-off in this area. The essential thought is to make the
encountering proof based on the trust. In our
node and encrypts its genuine ID with general
public key of the relay node. Such information is proposed system, every node, say N i, keeps up a
policy, Yi, to choose what data can be have to guarantee that two commonly trusted
incorporated into the encountering proof for nodes can share their genuine identifies secretly
each authorized level. under eavesdropping.

III. FEATURE ENHANCEMENTS Advanced Encountering Evidence Relaying

We have additionally composed two extensions The outline of Face Change depends on the
to upgrade Face Change’s practically. The basic social networks routing algorithm to
principal extension, inspired by our every day forward an encountering proof from its maker to
experiences, designs a plan to support the the transfer node and from the relay node to the
capacity of "white list" over Face Change. It beneficiary node. As appeared in previous
permits common trusted nodes to collect the section, this prompts additional delays on
encountering data during the encountering encountering proof collection. In this manner,
straightforwardly. The second one upgrades the we additionally design an extension to upgrade
proficiency of the encountering proof relaying the effectiveness of the encountering proof
by letting the beneficiary node determine more relaying. The proposed method empowers the
data about how to achieve it. community based routing that shows better
routing efficiency in MOSNs. Such routing
White List
strategies accept, to the point that communities
The plan of Face Change presented in figures it have been made in view of node encountering
out solid anonymity among neighbors at the cost records. Nodes in one community have a higher
of indirect encountering data collection. In any likelihood to meet with each other than with
case, as a general rule, we generally observe that outside nodes. In such a strategy, a packet is in
a user has a couple of authorized peers and the first sent to the community holding the
willing share his/her genuine identity with them destination node and afterward depends on intra
during the encountering. Along these lines, we community sending to come to the destination
additionally propose a progressed plan to permit node. In this way, this routing methodology
such a feature among devices in Face Change, requires each node to know the communication
which is named "white list" in this paper. Since to which the destination node of every packet it
neighbor anonymity still should be looked after, holds has a place with. We take care of this
we need to acknowledge two functions to issue by giving the beneficiary node a chance to
empower the "white list" include. In the first determine such data. In particular, when a
place, we have to empower anonymous put beneficiary node sends the data of the relay
stock in node recognizable proof, i.e., nodes can node to the maker of the encountering proof, it
find trusted nodes anonymously. Second, we connects the group ID of the relay node also, its
own community ID that has been encrypted with between encountering nodes in the experiment.
the public key of the relay node. Therefore, the The encountering term takes after the record in
encountering proof maker can utilize the the trace. We likewise expect that the span of
community ID of the relay node to lead every packet is 200 kb, and every node has a
community based routing to forward the memory size of 10 Mb. during each
encountering proof to the relay node. encountering, every node randomly chooses one
Subsequent to getting the encountering proof, node from the main 5 most regularly met nodes
the relay node can decode the community ID of as the relay node. We adopted PROPHET as the
the beneficiary node and utilize such data to basic routing methodology for benchmark Face
forward the encountering proof to the Change in the analyses. In PROPHET, every
beneficiary node all the more proficiently. In node keeps up its future gathering probabilities
this procedure, every node just reveals its with different nodes in view of past records to
encoded community ID to neighboring nodes, direct packet routing.
which must be decoded by the chose relay node.
Effectiveness of Privacy Protection
Thus, the node anonymity is not broken up this
extension. We initially assess the impact of security
protection. In this test, we measured the security
IV. PERFOMENCE ANALASYS
leakage as duplicate pseudonyms (i.e., the
We received two real traces in the tests: the MIT minimum number of indistinguishable
Reality trace and the Haggle project trace. The pseudonyms by a node) and revealed IDs (i.e.,
previous trace records the gatherings amongst the quantity of indistinguishable pseudonyms by
students and professionals on MIT campus for a node). The pseudonyms include those
around 30 days, while the last trace incorporates promoted by every node for the communication
the encountering between researchers going to with neighbor nodes and encoded IDs in the
Infocom 2006 for around 4 days. We receive the encountering proofs. The test outcomes are
two traces since they describes to common appeared in Table II. We found that as it were
MOSN situations in which devices meet hardly any indistinguishable pseudonyms can be
opportunistically. We composed an event driven seen by every node what not indistinguishable
test system for the examination. The connection pseudonyms from various nodes in the
availability between nodes is inferred from framework in the trials with the two traces. This
contact times in the trace. Since there is no implies nodes can’t utilize the transmitted
record of the separation between two pseudonyms to recognize neighbor nodes. Such
encountering nodes in the trace, we expect a an outcome in conjunction with the examination
direct information transmission rate of 500 kbs in previous sections.
Efficiency of the Encountering Evidence MOSNs for the most part take after a specific
Collection pattern, such delays don’t corrupt the packet
routing effectiveness fundamentally, as appeared
In this test, we measured the achievement rate,
in next area. We also find that the normal
normal delay, and normal number of hopes of
number of nodes is little in the tests. This
gathered encountering proofs. The achievement
demonstrates the additional expenses on
rate describes to the level of effectively collected
encountering proof relay are satisfactory in Face
encountering proofs. The normal delay and
Change.
normal hopes signify the time and the sending
hopes each gathered encountering proof Impact on Packet Routing
encounters all experiences on considered. The
In the test, 15,000 packets were created with
test outcomes are appeared in Figure 3.
randomly choose sources and destinations. Since
encountering proof may not arrive at a hub
successively following their creation times, we
reserve each arrived proof for a period of time
(Tc) before handling it for packet routing. We
shifted Tc in this test to see its impact. We
measured achievement rate and normal delay in
the test. The previous section refers to the level
Fig. 3. Evidence collection efficiency with both of effectively delivered packets and the past
traces. (a) Success rate. (b) Average delay. (c) refers to the normal delay of these packets.
Average number of hops.
Energy Consumption
We see from the assume that the achievement
rates reach about 93% and 77% in the tests with To assess the energy utilization of proposed
the MIT Reality trace and the haggle trace, work, we conducted experiments with two
separately. This demonstrates generally Windows Phones: HTC Encompass and LG
encountering proofs can be effectively gathered Quantum. We verify the key parts in Face
in Face Change. The achievement rate is low in Change, i.e., blind protocol checking and
the Haggle trace in light of the fact that a few packet/encountering proof relaying, with two
nodes exist for a brief period of time in the trace. remote advance technologies. We first let the
We find that the normal delays are around two telephones communicate with a server
120,000 seconds and 33,000 seconds in the tests through Wi-Fi and after that let the two
with the two traces, separately. Since the telephones communicate with each other
encountering frequencies between nodes in through Bluetooth. We did exclude the energy
cost of bilinear pairing since it has been turned constantly turned on for neighbor discovery,
out to be acceptable in a past literature. All which will be high for Wi-Fi and low for
devices were restored to manufacturing plant Bluetooth. We concentrate on the extra cost
setting and were completely charged before each caused by the information trade incurred by Face
test. We quantified the energy utilization as the Change between experienced a node, which is
level of residual battery level after certain appeared to be acceptable for current devices.
rounds of encountering. In blind strategy
V. CONCLUSION
checking, we expect each device has 5 compose
based properties and 5 value based attributes. In Our proposed framework that supports both
packet and encountering proof relay, we expect neighbor anonymity and genuine ID based
a device exchanges N p packets and Ne proofs in encountering data collection in MOSNs. In Face

each encountering. N p And N r were randomly Change, every node sequentially changes its
pseudonyms parameters when speaking with
obtained from [100, 300]. Such a setting
neighbors nodes to hide its genuine ID.
matches the circumstance in the genuine follow.
Encountering proofs are then made to empower
We measured the level of residual battery level
hubs to gather the genuine ID based
after each 50 experiences. Each test was keep
encountering data. After two encountering hubs
running for 10 times. The test comes about are
disengage, the encountering proof is transferred
appeared in Figure 3.
to the encountering nodes through a chose relay
node. Reasonable strategies are adopted in these
means to guarantee the security and proficiency
of the encountering proof collection. Trust
based control over what data can be included in
the encountering proof is supported in Face
Change. Proposed extensions have additionally
been proposed to help the “white list" highlight
and upgrade the encountering proof relay
effectiveness. Extensive examination and tests
Fig 4. Energy consumption in real test
are led to demonstrate the adequacy and energy
We see from the assume that 50 experiences effectiveness of Face Change in securing hub
expend roughly around 1% of aggregate battery protection and supporting the encountering data
with Wi-Fi and 0.2% with Bluetooth. Note that gathering in mobile social networks.
such outcomes don't demonstrate the energy
utilization whenever Wi-Fi or Bluetooth is VI. REFERENCES
[1] P. Hui, E. Yoneki, S. Y. Chan, and J.
Crowcroft, “Distributed community detection in
delay tolerant networks,” in Proc. MobiArch,
2007, Art. no. 7,

[2] K. Chen and H. Shen, “SMART:


Lightweight distributed social map based
routing in delay tolerant networks,” in Proc.
IEEE ICNP, Oct./Nov. 2012, pp. 1–10.

[3] K. Chen, H. Shen, and H. Zhang,


“Leveraging social networks for p2p content-
based file sharing in disconnected MANETs,”
IEEE Trans. Mobile Comput., vol. 13, no. 2, pp.
235–249, Feb. 2014.

[4] F. Li and J. Wu, “MOPS: Providing content-


based service in disruptiontolerant networks,” in
Proc. IEEE ICDCS, Jun. 2009, pp. 526–533.

[5] M. Motani, V. Srinivasan, and P. S.


Nuggehalli, “PeopleNet: Engineering a wireless
virtual social network,” in Proc. MOBICOM,
2005, pp. 243–257.

[6] G. Costantino, F. Martinelli, and P. Santi,


“Privacy-preserving interestcasting in
opportunistic networks,” in Proc. IEEE WCNC,
Apr. 2012, pp. 2829–2834. [11] R. Lu et al.,
“Prefilter: An efficient privacy-preserving relay
filtering scheme for delay tolerant networks,” in
Proc. IEEE INFOCOM, Mar. 2012, pp. 1395–
1403.

Das könnte Ihnen auch gefallen