Random graph models for wireless and social networks: keynote talk abstract

M. Grossglauser
{"title":"Random graph models for wireless and social networks: keynote talk abstract","authors":"M. Grossglauser","doi":"10.1145/2159576.2159578","DOIUrl":null,"url":null,"abstract":"Operating large-scale social applications over opportunistic wireless networks entails many fascinating engineering challenges. We strive for robust and efficient algorithms for specific problems like opportunistic forwarding, routing, or publish-subscribe, and we want to ascertain global properties like security, privacy, fairness, and high performance. One particular set of challenges concerns the scalability of this whole endeavor: is it fundamentally possible for such applications and underlying methods to scale up to large networks, without jeopardizing desirable system properties?\n We discuss recent progress in some of the key problems in this area at three conceptual layers: opportunistic forwarding, routing under mobility, and social network privacy.\n Opportunistic forwarding exploits the random broadcast nature of the wireless channel and the availability of multiple \"good\" routes towards a destination. This approach can deliver a message to its destination at a potentially lower expected cost than over a single shortest path. We introduce a forwarding algorithm and associated \"anypath metric\" that is optimal, building on the observation that no single-path metric can achieve optimality in general.\n In routing under mobility, the key challenge is to keep track of the changing network topology, so that efficient routes can be computed at any time between any pair of nodes. We ask whether there exist low-overhead schemes that produce low-stretch routes, even in large networks where all the nodes are mobile. We present a scheme that maintains a hierarchical structure within which constant-stretch routes can be efficiently computed between every pair of nodes. The scheme rebuilds each level of the hierarchy periodically, at a rate that decreases exponentially with the level of the hierarchy, and achieves constant stretch under a mild smoothness condition on the mobility process.\n Finally, we address the problem of the privacy of an anonymized social network. The specific challenge is the sharing or public release of anonymized network data without accidentally leaking personally identifiable information (PII). Unfortunately, it is often difficult to ascertain that sophisticated statistical techniques, potentially employing additional external data sources, are unable to break anonymity. We show an asymptotic condition, based on a random graph model, under which a computationally powerful adversary would be able to re-identify the anonymized node identities. This has important implications for privacy policies in social network structures.\n What binds the above problem formulations and results together is our reliance on stochastic network models that retain only the salient features of each problem. These abstractions allow us to make precise statements about scalability to very large systems. We hope that these results complement and inform more focused work on methods, protocols, and applications for mobile, opportunistic, and social networks.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Mobile Opportunistic Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2159576.2159578","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Operating large-scale social applications over opportunistic wireless networks entails many fascinating engineering challenges. We strive for robust and efficient algorithms for specific problems like opportunistic forwarding, routing, or publish-subscribe, and we want to ascertain global properties like security, privacy, fairness, and high performance. One particular set of challenges concerns the scalability of this whole endeavor: is it fundamentally possible for such applications and underlying methods to scale up to large networks, without jeopardizing desirable system properties? We discuss recent progress in some of the key problems in this area at three conceptual layers: opportunistic forwarding, routing under mobility, and social network privacy. Opportunistic forwarding exploits the random broadcast nature of the wireless channel and the availability of multiple "good" routes towards a destination. This approach can deliver a message to its destination at a potentially lower expected cost than over a single shortest path. We introduce a forwarding algorithm and associated "anypath metric" that is optimal, building on the observation that no single-path metric can achieve optimality in general. In routing under mobility, the key challenge is to keep track of the changing network topology, so that efficient routes can be computed at any time between any pair of nodes. We ask whether there exist low-overhead schemes that produce low-stretch routes, even in large networks where all the nodes are mobile. We present a scheme that maintains a hierarchical structure within which constant-stretch routes can be efficiently computed between every pair of nodes. The scheme rebuilds each level of the hierarchy periodically, at a rate that decreases exponentially with the level of the hierarchy, and achieves constant stretch under a mild smoothness condition on the mobility process. Finally, we address the problem of the privacy of an anonymized social network. The specific challenge is the sharing or public release of anonymized network data without accidentally leaking personally identifiable information (PII). Unfortunately, it is often difficult to ascertain that sophisticated statistical techniques, potentially employing additional external data sources, are unable to break anonymity. We show an asymptotic condition, based on a random graph model, under which a computationally powerful adversary would be able to re-identify the anonymized node identities. This has important implications for privacy policies in social network structures. What binds the above problem formulations and results together is our reliance on stochastic network models that retain only the salient features of each problem. These abstractions allow us to make precise statements about scalability to very large systems. We hope that these results complement and inform more focused work on methods, protocols, and applications for mobile, opportunistic, and social networks.
无线和社会网络的随机图模型:主题演讲摘要
在有机会的无线网络上运行大规模的社交应用程序需要面对许多令人着迷的工程挑战。我们努力为机会转发、路由或发布-订阅等特定问题提供强大而高效的算法,我们希望确定安全性、隐私性、公平性和高性能等全局属性。一组特别的挑战涉及到整个努力的可伸缩性:这些应用程序和底层方法是否从根本上有可能扩展到大型网络,而不损害理想的系统属性?我们从三个概念层面讨论了该领域一些关键问题的最新进展:机会转发、移动路由和社交网络隐私。机会转发利用无线信道的随机广播特性和通往目的地的多条“好”路由的可用性。这种方法可以以比单一最短路径更低的预期成本将消息传递到目的地。我们介绍了一种转发算法和相关的“任意路径度量”,它是最优的,建立在观察的基础上,通常没有单一路径度量可以达到最优性。在可移动性下的路由问题中,关键问题是如何跟踪网络拓扑结构的变化,以便在任意节点对之间随时计算出有效的路由。我们询问是否存在低开销方案,即使在所有节点都是移动的大型网络中也能产生低拉伸路由。我们提出了一种保持分层结构的方案,该方案可以有效地计算每对节点之间的恒定拉伸路由。该方案周期性地对每一层进行重建,重建的速度随层数的增加呈指数递减,并在移动过程的温和平滑条件下达到恒定的拉伸。最后,我们讨论了匿名社交网络的隐私问题。具体的挑战是共享或公开发布匿名网络数据,而不会意外泄露个人身份信息(PII)。不幸的是,通常很难确定复杂的统计技术(可能使用额外的外部数据源)是否无法打破匿名性。我们展示了一个基于随机图模型的渐近条件,在此条件下,计算能力强大的对手将能够重新识别匿名节点身份。这对社会网络结构中的隐私政策具有重要意义。将上述问题的表述和结果联系在一起的是我们对随机网络模型的依赖,这些模型只保留了每个问题的显著特征。这些抽象允许我们对非常大的系统的可伸缩性做出精确的陈述。我们希望这些结果能够补充和告知更多专注于移动、机会主义和社交网络的方法、协议和应用的工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信