Skip to content

Research at St Andrews

Privacy-enhanced social network routing in opportunistic networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Author(s)

Iain Siraj Parris, Gregory John Bigwood, Tristan Nicholas Hoang Henderson

School/Research organisations

Abstract

Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. Forwarding messages in such a network often involves the use of social network routing-sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast these social networks, which introduces privacy concerns. This paper introduces two methods for enhancing privacy in social network routing by obfuscating the social network graphs used to inform routing decisions. We evaluate these methods using two real-world datasets, and find that it is possible to obfuscate the social network information without leading to a significant decrease in routing performance.
Close

Details

Original languageEnglish
Title of host publicationProceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
Subtitle of host publicationIEEE International Workshop on Security and Social Networking (SESOC 2010)
PublisherIEEE Computer Society
Pages624-629
ISBN (Print)978-1-4244-6605-4
DOIs
Publication statusPublished - Mar 2010
Event2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) - Mannheim, Germany
Duration: 29 Mar 20102 Apr 2010

Conference

Conference2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
CountryGermany
CityMannheim
Period29/03/102/04/10

    Research areas

  • Ad hoc networks, Data privacy, Message passing, Mobile radio, Social networking, Telecommunication security

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Data portability as a tool for audit

    Zwiebelmann, Z. & Henderson, T., 25 Sep 2021, Adjunct Proceedings of the Ubicomp Workshop on Reviewable and Auditable Pervasive Systems (WRAPS). ACM, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  4. Short paper: Integrating the data protection impact assessment into the software development lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 2020, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Garcia-Alfaro, J., Navarro-Arribas, G. & Herrera-Joancomarti, J. (eds.). Cham: Springer, p. 219-228 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. 12484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 3378247

Top