Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/45048' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/45048' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Private mobility-cast for opportunistic networks | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

Private mobility-cast for opportunistic networks

n this paper, we introduce the notion of mobility-cast in opportunistic networks, according to which a message sent by a user S is delivered to users with a mobility pattern similar to that of S – collec- tively named place-friends. Motivation for delivering a message to place-friends stems from the fact that current social acquaintances are likely to be place-friends. Most importantly, it has been recently found that a large fraction of new social contacts come from place-friends. After introducing mobility-cast, we present a privacy-preserving mobile-cast protocol based on secure two-party computation. The effective- ness of the protocol in delivering messages to place-friends is demonstrated by means of analysis and extensive simulations based on a realistic mobility model. In the last part of the paper, we present two alternative implementations of mobility-cast on the Android platform, and test their computational per- formance on a number of different smartphones. Overall, the results presented in this paper show that privacy-preserving mobility-cast can be effectively implemented with current mobile phone technology.

Computer Networks, 2017

Autori esterni: Rajib Maiti (SUTD)
Autori IIT:

Tipo: Contributo in rivista ISI
Area di disciplina: Computer Science & Engineering

File: ComNetCR.pdf
Da pagina 28 a pagina 42

Attività: Algoritmica per reti wireless
Wireless Network Security
Sicurezza di dispositivi mobili