{"title":"保护隐私的社会权力保护机会主义网络","authors":"Bernhard Distl, S. Neuhaus","doi":"10.1109/COMSNETS.2015.7098697","DOIUrl":null,"url":null,"abstract":"Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Social power for privacy protected opportunistic networks\",\"authors\":\"Bernhard Distl, S. Neuhaus\",\"doi\":\"10.1109/COMSNETS.2015.7098697\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.\",\"PeriodicalId\":277593,\"journal\":{\"name\":\"2015 7th International Conference on Communication Systems and Networks (COMSNETS)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 7th International Conference on Communication Systems and Networks (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS.2015.7098697\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2015.7098697","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Social power for privacy protected opportunistic networks
Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.