Skip to content

Research at St Andrews

Privacy-enhanced social-network routing

Research output: Contribution to journalArticle

Author(s)

Iain Siraj Parris, Tristan Henderson

School/Research organisations

Abstract

Opportunistic networking—forwarding messages in a disconnected mobile ad hoc network via any encountered nodes — offers a new mechanism for exploiting the mobile devices that many users now carry. Forwarding messages in such a network often involves the use of social-network routing— sending messages via nodes in the sender or recipient’s friends list. Simple social-network routing, however, may broadcast these friends lists, which introduces privacy concerns.
This paper presents a threat analysis of the privacy risks in social-network routing. We introduce two complementary methods for enhancing privacy in social-network routing by obfuscating the friends lists used to inform routing decisions. We evaluate these methods using three real-world datasets, and find that it is possible to obfuscate the friends lists without leading to a significant decrease in routing performance, as measured by delivery cost, delay and ratio. We quantify the increase in security provided by this obfuscation, with reference to classes of attack which are mitigated.
Close

Details

Original languageEnglish
Pages (from-to)62-74
Number of pages9
JournalComputer Communications
Volume35
Issue number1
Early online date19 Nov 2010
DOIs
Publication statusPublished - 1 Jan 2012

    Research areas

  • Social networks, Opportunistic networks, Privacy, Social-network routing

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Related by journal

  1. A framework for P2P application development

    Walkerdine, J., Hughes, D., Rayson, P., Simms, J., Gilleade, K., Mariani, J. & Sommerville, I., 5 Feb 2008, In : Computer Communications. 31, 2, p. 387-401 15 p.

    Research output: Contribution to journalArticle

  2. SPICE: Scalable P2P implicit group messaging

    Cutting, D., Quigley, A. & Landfeldt, B., 25 Feb 2008, In : Computer Communications. 31, 3, p. 437-451 15 p.

    Research output: Contribution to journalArticle

ID: 2946605

Top