WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET
|
Tools and Resources
Share: |
|||||||||||||||
ABSTRACTA number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. Further their location-based services are not offered to low-end mobile devices without GPS modules.
To build a system that can take advantage of cloud, and also can address these potential problems that could hinder OSN usage, we design and construct a multi-hop networking system named MoNet based on WiFi, and on top of which we design and implement WiFace, a privacy-aware geosocial networking service. For the situation without any infrastructure, we design a distributed content sharing protocol which can significantly shorten the relay path, reduce conflicts and improve data persistence and availability. A role strategy is designed to encourage users to collaborate in the network. Furthermore, a key management and an authorization mechanism are developed to prevent some attacks and protect privacy. We conduct comprehensive experiments to evaluate the performance of our mobile platform MoNet and application WiFace. The results show that MoNet is more than sufficient to support social networking, and even audio and video applications.
AUTHORS
|
|
||||||||||||||||||||||||||||||||||||||||
| View colleagues of Lan Zhang | |||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
| View colleagues of Xuan Ding | |||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
| View colleagues of Zhiguo Wan | |||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
| View colleagues of Ming Gu | |||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
| View colleagues of Xiang-Yang Li | |||||||||||||||||||||||||||||||||||||||||
REFERENCESNote: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.
|
1
|
Bittorrent protocol. http://bitconjurer.org/BitTorrent/protocol.html.
|
|
|
2
|
Gnutella. http://gnutella.wego.com.
|
|
|
3
|
Iperf. http://dast.nlanr.net/Projects/Iperf/.
|
|
| |
4
|
|
|
5
|
Corson, S., and Macker, J. Mobile ad hoc networking (manet).
|
|
| |
6
|
|
|
7
|
Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT 22, 6 (1976), 644--654.
|
|
| |
8
|
Richard Draves , Jitendra Padhye , Brian Zill, Comparison of routing metrics for static multi-hop wireless networks, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, August 30-September 03, 2004, Portland, Oregon, USA [doi>10.1145/1015467.1015483]
|
| |
9
|
|
|
10
|
Freedman, R., and Andmolnar, M. The freehaven project: Distributed anonymous storage service, 2000.
|
|
|
11
|
||
|
12
|
Johnson, D., Stack, T., Fish, R., Flickinger, D., Stoller, L., Ricci, R., and Lepreau, J. Mobile emulab: A robotic wireless and sensor network testbed. In IEEE INFOCOM (2006).
|
|
|
13
|
Johnson, D. B., and Maltz, D. A. Dynamic source routing in ad-hoc wireless networks. Mobile Computing (1996).
|
|
|
14
|
Koblitz, N. Elliptic curve cryptosystems. Mathematics of computation 48, 177 (1987), 203--209.
|
|
|
15
|
||
|
16
|
Lenstra, A., and Verheul, E. Selecting cryptographic key sizes. Journal of Cryptology 14 (2005), 255--293.
|
|
| |
17
|
|
|
18
|
||
|
19
|
Matuszewski, M., Pucha, H., and Hu, Y. C. Understanding attitudes towards mobile peer-to-peer content sharing services. In PORTABLE'07.
|
|
|
20
|
||
|
21
|
Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., Siracusa, R., Liu, H., and Singh, M. Overview of the orbit radio grid testbed for evaluation of next-generation wireless network protocols. In WCNC' 05.
|
|
| |
22
|
|
|
23
|
Schelling, T. C. Models of segregation. American Economic Review 59, 2 (May 1969), 488--493.
|
|
|
24
|
Schelling, T. C. Dynamic models of segregation. Journal of Mathematical Sociology 1 (1971), 143--186.
|
|
|
25
|
||
|
26
|
Shi, J., Gurewitz, O., Mancuso, V., Camp, J., and Knightly, E. Measurement and modeling of the origins of starvation in congestion controlled mesh networks. In INFOCOM' 08.
|
|
| |
27
|
Ion Stoica , Robert Morris , David Karger , M. Frans Kaashoek , Hari Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, p.149-160, August 2001, San Diego, California, USA [doi>10.1145/383059.383071]
|
|
28
|
Zhang, L., and Ding, X. Cooperative content sharing in geosocial networking system. In Technical report. http://166.111.80.235:8080/twiki/bin/view/TWiki/ResearchPaper.
|
CITED BY3 Citations
|
|
|
|
|
INDEX TERMS
PUBLICATION| Title | MCS '10 Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond table of contents | ||||||||||||||||||||||||||
| Program Chairs | Rick Han | ||||||||||||||||||||||||||
| Li Erran Li | |||||||||||||||||||||||||||
| Article No. | 3 | ||||||||||||||||||||||||||
| Publication Date | 2010-06-15 (yyyy-mm-dd) | ||||||||||||||||||||||||||
| Funding Sources |
Division of Computer and Network Systems Ministry of Science and Technology of the People's Republic of China National Natural Science Foundation of China |
||||||||||||||||||||||||||
| Sponsors | SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing | ||||||||||||||||||||||||||
| In-Cooperations | SIGOPS ACM Special Interest Group on Operating Systems | ||||||||||||||||||||||||||
| Publisher | ACM New York, NY, USA ©2010 | ||||||||||||||||||||||||||
| ISBN: 978-1-4503-0155-8 doi>10.1145/1810931.1810934 | |||||||||||||||||||||||||||
| Conference |
MobiSysMobile Systems, Applications, and Services
|
||||||||||||||||||||||||||
| Overall Acceptance Rate 20 of 29 submissions, 69% | |||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
REVIEWS
COMMENTSBe the first to comment To Post a comment please sign in or create a free Web account
Table of Contents| WhereStore: location-based data storage for mobile devices interacting with the cloud | |
| Patrick Stuedi, Iqbal Mohomed, Doug Terry | |
| Article No.: 1 | |
| doi>10.1145/1810931.1810932 | |
Full text: PDF
|
|
|
In recent years, two major trends have changed the way mobile phones are used: smartphones have become a platform for applications, and 3G connectivity has turned them into ubiquitous Internet clients. Increasingly, applications on smartphones (such ...
expand
|
|
| User-profile-driven collaborative bandwidth sharing on mobile phones | |
| Eric Jung, Yichuan Wang, Iuri Prilepov, Frank Maker, Xin Liu, Venkatesh Akella | |
| Article No.: 2 | |
| doi>10.1145/1810931.1810933 | |
Full text: PDF
|
|
|
The advent of smart phones, along with the paradigm shift towards cloud-based services, presents new challenges to the cellular backbone infrastructure. Cisco predicts that mobile data traffic will double every year through 2014, with a CAGR of 108% ...
expand
|
|
| WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET | |
| Lan Zhang, Xuan Ding, Zhiguo Wan, Ming Gu, Xiang-Yang Li | |
| Article No.: 3 | |
| doi>10.1145/1810931.1810934 | |
Full text: PDF
|
|
|
A number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. ...
expand
|
|
| Vision: towards real time epidemic vigilance through online social networks: introducing SNEFT -- social network enabled flu trends | |
| Lingji Chen, Harshavardhan Achrekar, Benyuan Liu, Ross Lazarus | |
| Article No.: 4 | |
| doi>10.1145/1810931.1810935 | |
Full text: PDF
|
|
|
Our vision is to achieve faster and near real time detection and prediction of the emergence and spread of an influenza epidemic, through sophisticated data collection and analysis of Online Social Networks (OSNs) such as Facebook, MySpace, and Twitter. ...
expand
|
|
| Mobile computing: the next decade | |
| Mahadev Satyanarayanan | |
| Article No.: 5 | |
| doi>10.1145/1810931.1810936 | |
Full text: PDF
|
|
|
"Information at your fingertips anywhere, anytime" has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology, energy-efficient portable hardware ...
expand
|
|
| A virtual cloud computing provider for mobile devices | |
| Gonzalo Huerta-Canepa, Dongman Lee | |
| Article No.: 6 | |
| doi>10.1145/1810931.1810937 | |
Full text: PDF
|
|
|
A mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information tasks. However, a mobile device is still resource constrained, ...
expand
|
|
| Dynamically partitioning applications between weak devices and clouds | |
| Byung-Gon Chun, Petros Maniatis | |
| Article No.: 7 | |
| doi>10.1145/1810931.1810938 | |
Full text: PDF
|
|
|
Mobile cloud computing applications run diverse workloads under diverse device platforms, networks, and clouds. Traditionally these applications are statically partitioned between weak devices and clouds, thus may be significantly inefficient in heterogeneous ...
expand
|
|
| PrPl: a decentralized social networking infrastructure | |
| Seok-Won Seong, Jiwon Seo, Matthew Nasielski, Debangsu Sengupta, Sudheendra Hangal, Seng Keat Teh, Ruven Chu, Ben Dodson, Monica S. Lam | |
| Article No.: 8 | |
| doi>10.1145/1810931.1810939 | |
Full text: PDF
|
|
|
This paper presents PrPl, a decentralized infrastructure that lets users participate in online social networking without loss of data ownership. PrPl, short for private-public, has a person-centric architecture--each individual uses a Personal-Cloud ...
expand
|