June 2010
MCS '10: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4, Downloads (12 Months): 34, Downloads (Overall): 635
Full text available:
PDF
A number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. Further their location-based services are not offered to low-end mobile devices without GPS modules. ...
Keywords:
WiFi, privacy, social network, MANET, WiFace
Title:
WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET
Keywords:
WiFace
Abstract:
... WiFi, and on top of which we design and implement <i>WiFace</i>, , a privacy-aware geosocial networking service. For the situation without ... evaluate the performance of our mobile platform MoNet and application WiFace. . The results show that MoNet is more than sufficient ...
Full Text:
WiFace: : a secure geosocial networking system using WiFi-based multi-hop MANETWiFace: ... WiFi, and on top of which we design and imple-ment WiFace, , a privacy-aware geosocial networking service. Forthe situation without any ... and even audio and video applications.KeywordsWiFi, Social Network, Privacy, MANET, WiFace. .1. INTRODUCTIONAfter reaching 4.6 billion mobile subscriptions by the end ...
... devices named MoNet and a distributed geosocial network-ing application named WiFace with a security mechanism. WiFacenot only supports common social networking ...
... evaluations of routing protocols based ondifferent link metrics in typical WiFace application scenarios,and implement MoNet on ordinary mobile phones and lap-tops. ... this paper is organized as follows. Section 2 de-scribes the WiFace application and other potential applications us-ing MoNet. We present system ... of MoNet, we designed and implemented two applica-tions, one is WiFace and the other is WiMarket. In this paper, wewill discuss ...
... travel to make new friendsor add value for the ride. WiFace also can be used in other socialplaces both indoor or ... our geosocial net-working system and the design of MoNet and WiFace. .3.1 Hierarchical System ArchitectureWiFace Funtionality LayerWiFace Application Protocol LayerSystem Management ... StrategyMembership OrganizationReplication MechanismSource Node SelectionTCP/IPDriver/Routing LayerPhysical NIC Virtual NICFigure 2: WiFace Application Structure.Our system consists of two main components: the MoNet ... of two main components: the MoNet net-work platform and the WiFace application built on top of MoNet,illustrated by Figure 2.The MoNet ... details about this layer will bediscussed in the following subsections.The WiFace application layer is based on the connection of MoNet.System management, ... to realize more other applica-tions.Details about MoNet network platform and WiFace applicationwill be discussed in Subsections 3.2 and 3.3 respectively.3.2 Network ...
... MoNet based on evaluation of real equipment exper-iments in typical WiFace application scenarios. Here in our im-plementation, we will mainly focus ...
... worry about thetransmission security and unauthorized clients.3.3 Application DesignWe demonstrate WiFace application structure in Figure 2. Thereare two main layers based ... Connectionlayer:1. Application Protocol Layer contains three important andfundamental parts of WiFace. . The system management isimplemented via periodical beacons and broadcast ... efficient light-weight security mechanism are themost crucial parts of our WiFace design and implementation. Wewill discuss them one by one in ...
... off-the-shelf con-tent sharing protocol can directly be used in WiFace.In WiFace, , we design and implement an active cooperative con-tent sharing ... which indicates its probability(role level/10)to replicate a content item in WiFace automatically. For every node,a recommended role level is calculated locally ... and transmitted by itrecorded in member lists. A user of WiFace needs to spend hisreputation points as currency on some functionalities ... currency on some functionalities and location-based services.We have presented the WiFace network with a graph and usedstochastic models to describe the ... ar-ticles, photographs and other information being seen by someonewithout authorizations.In WiFace, , we use different types of keys to protect private ... foruser authentication and encrypting one?s private content.2. Friend key: in WiFace each pair of friends share a sameconfidential 128-bit symmetric key ... account key or friend keys for access control.Friend Key Exchange:In WiFace two individuals exchange a friend key for establish-ing a friendship ...
... Sharing Protocol of WiFaceWe evaluate our content sharing protocol of WiFace in 2 typicalscenarios.In Scenario 1, there were 20 users on ...