Towards Trustworthy Mobile Social Networking

  • Zheng Yan
  • Valtteri Niemi
  • Yu Chen
  • Peng Zhang
  • Raimo Kantola
Part of the Computational Social Sciences book series (CSS)


Self-organized networks based on mobile devices, e.g., mobile ad hoc networks (MANET), are becoming a practical platform for mobile social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in mobile social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed mobile social environments. This book chapter reviews the literature with regard to how to build up trust in mobile social networking. We explore whether mobile social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, we propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendation and preservation, and other trust and privacy enhancement technologies. Simulations, prototype implementation, and trial experiments further prove the effectiveness of proposed solutions.


Trust Management Trust Level Reputation System Query Node Mobile Social Networking 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work is sponsored by the Fundamental Research Funds for the Central Universities with the grant number K5051201032 and the initial grant of Chinese Educational Ministry for researchers returned from abroad. The authors would like to thank Nokia Research Center. Part of the work for this chapter was conducted and sponsored by Nokia Research Center, Helsinki and Nokia Research Center, Lausanne.


  1. Aad, I., & Niemi, V. (2010). NRC data collection and privacy by design principles. In Proceedings of PhoneSense (pp. 41–45). Zurich, Switzerland.Google Scholar
  2. Adler, BT., & Alfaro, L. (2007). A content-driven reputation system for the Wikipedia. In WWW (pp. 261–270). Banff, Alberta, Canada.Google Scholar
  3. Ahn, J., & Amatriain, X. (2010). Towards fully distributed and privacy-preserving recommendations via expert collaborative filtering and RESTful linked data. In WI-IAT’10 (pp. 66–73). Toronto, Canada.Google Scholar
  4. Ahtiainen, A., et al. (2009). Awareness networking in wireless environments: Means of exchanging information. IEEE Vehicular Technology Magazine, 4(3), 48–54.CrossRefGoogle Scholar
  5. Bansal, S., & Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks (Technical Report No. NI/0307012). Stanford University, CA, USA.Google Scholar
  6. Basin, D., Klaedtke, F., Muller, S., Pfitzmann, B. (2008). Runtime monitoring of metric first-order temporal properties. In Proceedings of FSTTCS (pp. 49–60), Bangalore: India.Google Scholar
  7. Beach, A., Gartrell, M., Han, R. (2009). Solutions to security and privacy issues in mobile social networking. In International conference on computational science and engineering, 2009, CSE ’09 (Vol. 4, pp. 1036–1042). Vancouver.Google Scholar
  8. Becchetti, L., Castillo, C., Donato, D. et al. (2006). Using rank propagation and probabilistic counting for link-based spam detection. In Proceedings of WebKDD. Philadelphia, August 20, 2006.Google Scholar
  9. Berkovsky, S. (2010). Putting things in context: Challenge on context-aware movie recommendation. In Proceedings of the workshop on context-aware movie recommendation (pp 2–6). Barcelona. Google Scholar
  10. Bethencourt, J., Sahai, A., Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE symposium on security and privacy (pp. 321–334). Oakland.Google Scholar
  11. Bi, J., Wu, J., Zhang, W. (2008). A trust and reputation based anti-spam method. IEEE INFOCOM, 2485–2493.Google Scholar
  12. Bilge, A., & Polat, H. (2010). Improving privacy-preserving NBC-based recommendations by preprocessing. WI-IAT (pp. 143–147). Toronto.Google Scholar
  13. Bilogrevic, I., Jadliwala, M., Lam, I., et al. (2012). Big Brother knows your friends: On privacy of social communities in pervasive networks. In Proceedings of the 10th International Conference on Pervasive Computing. Newcastle, UKGoogle Scholar
  14. Bindschaedler, L., Jadliwala, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V., Hubaux, J.P. (2012). Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS). Hilton San Diego Resort & Spa, US.Google Scholar
  15. Biswas, D., Nefedov, N., Niemi, V. (2011). Distributed usage control the 8th International Conference on Mobile Web Information Systems (MobiWIS 2011). In Proceedings. of MobiWIS. Procedia Computer Science 5, 562–569. Niagara Falls, Ontario, CanadaGoogle Scholar
  16. Blaze, M., Feigenbaum, J., Lacy, J. (1996). Decentralized trust management. In Proceedings. of the IEEE Conference on Security and Privacy. (pp. 164–173). Oakland, CAGoogle Scholar
  17. Buchegger, S., & Boudec, J.L. (2002). Performance analysis of the CONFIDANT protocol. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) Lausanne, Switzerland. (pp. 226–236).Google Scholar
  18. Buchegger, S., & Boudec, J.Y.L. (2003). The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Sophia-Antipolis, France.Google Scholar
  19. Chen, Y. (2010). A privacy-enhanced reputation system for mobile ad hoc services. Master thesis, Aalto University, Espoo, Finland.Google Scholar
  20. Chen, G., & Rahman, F. (2008). Analyzing privacy designs of mobile social networking applications. In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC’08: Shanghai, China. Vol. 2. (pp. 83–88).Google Scholar
  21. Chen, Y., Yan, Z., Niemi, V. (2011). Implementation of a reputation system for pervasive social networking. In IEEE TrustID 2011 (pp. 857–862). Changsha, China.Google Scholar
  22. Chuong, C., Torabi, T., Loke, S.W. (2009). Towards context-aware task recommendation. In JCPC’09 (pp. 289–292). Taiwan.Google Scholar
  23. Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human–Computer Studies, Trust and Technology, 58(6), 737–758.CrossRefGoogle Scholar
  24. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.CrossRefGoogle Scholar
  25. Douceur, J.R. (2002). The Sybil attack. In IPTPS, LNCS 2429 (pp. 251–260). Cambridge, MA, USA.Google Scholar
  26. EZSetup. (2012). Accessed 20 June 2012.
  27. Goyal, V., Pandey, O., Sahai, A., et al. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). Alexandria, VA, USA.Google Scholar
  28. Gupta, M., Judge, P., Ammar, M. (2003). A reputation system for peer-to-peer networks. In Proceedings of the 13th international workshop on network and operating systems support for digital audio and video (NOSSDAV ’03), Monterey (pp. 144–152). New York: ACM.Google Scholar
  29. Gupta, A., Miettinen, M., Asokan, N. (2011). Using context-profiling to aid access control decisions in mobile devices. In Proceedings of PerCom Workshops (pp. 310–312). Seattle, WA, USA.Google Scholar
  30. Hancock, J.T., Toma, C., Ellison, N. (2007). The truth about lying in online dating profiles. Proceedings of the ACM CHI 2007 (pp. 449–452). San Jose, California, USA.Google Scholar
  31. Hu, J., & Burmester, M. (2006). LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th ACM Annual Southeast Regional Conference (pp. 119–123). Melbourne, FL, USA.Google Scholar
  32. Hyytia, E., Virtamo, J., Lassila, P., Kangasharju, J., Ott, J. (2011). When does content float? Characterizing availability of anchored information in opportunistic content sharing. In Proceedings of IEEE INFOCOM (pp. 3137–3145). Shanghai, China.Google Scholar
  33. Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J.P., Niemi, V. (2011). Privacy-triggered communications in pervasive social networks. In Proceedings of IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (pp. 1–6). Lucca, Italy.Google Scholar
  34. Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644. Elsevier.CrossRefGoogle Scholar
  35. Junction. (2012). Harvard MobiSocial Group. Accessed 20 June 2012.
  36. Katzenbeisser, S., & Petkovic, M. (2008). Privacy-preserving recommendation systems for consumer healthcare services. In ARES’08 (pp. 889–895). Barcelona , Spain.Google Scholar
  37. Kikuchi, H. (2009). Privacy-preserving collaborative filtering schemes. In ARES’09 (pp. 911–916). Fukuoka, Japan.Google Scholar
  38. Kiukkonen, N., Blom, J., Dousse, O., Gatica-Perez, D., Laurila, J. (2010). Towards rich mobile phone datasets: Lausanne data collection campaign. In Proceedings of ICPS. Berlin, Germany.Google Scholar
  39. Kolan, P., & Dantu, R. (2007). Socio-technical defense against voice spamming. ACM Transactions on Autonomous and Adaptive Systems, 2(1), Article 2(44).Google Scholar
  40. Krishna, P., Puttaswamy, N., Zhao, B. (2010). Preserving privacy in location-based mobile social applications. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10) Annapolis, Maryland, US (pp. 1–6). New York: ACM.Google Scholar
  41. Kujimura, K., & Nishihara, T. (2003). Reputation rating system based on past behavior of evaluators. In Proceedings of the 4th ACM Conference on Electronic Commerce (pp. 246–247). San Diego, CA, USA.Google Scholar
  42. Li, J., Li, R., Kato, J., et al. (2008). Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 46(4), 108–115.CrossRefGoogle Scholar
  43. Li, T., Gao, C., Du, J. (2009). A NMF-based privacy-preserving recommendation algorithm. In ICISE’09 (pp. 754–757). Nanjing, China.Google Scholar
  44. Liiv, I., Tammet, T., Ruotsalo, T. et al. (2009). A: Personalized context-aware recommendations in SMARTMUSEUM: Combining semantics with statistics. In SEMAPRO ’09 (pp. 50–55). Sliema, Malta.Google Scholar
  45. Liu, Z., Yau, S.S., Peng, D. et al. (2008a). A flexible trust model for distributed service infrastructures. In Proceedings of 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (pp. 108–115). Orlando, Florida, USA.Google Scholar
  46. Liu, D., Meng, X., Chen, J. (2008b). A framework for context-aware service recommendation. In ICACT 2008 (pp. 2131–2134). Gangwon-Do, Korea (South).Google Scholar
  47. Luo, Y., Le, J., Chen, H. (2009). A privacy-preserving book recommendation model based on multi-agent. WCSE ’09 (pp. 323–327). Xiamen, China.Google Scholar
  48. Michiardi, P., & Molva, R. (2002). Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security, LNCS 2828 (pp. 107–121). Portorož, Slovenia.Google Scholar
  49. MicroBlog. (2012). SyNRG, Duke University. Accessed 20 June 2012.
  50. Miluzzo, E., Lane, N., Fodor, K. et al. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ‘08) (pp. 337–350). Raleigh, NC, USA.Google Scholar
  51. Muller, S., Katzenbeisser, S., Eckert, C. (2008). Distributed attribute-based encryption. In Proceedings of the 11th Annual International Conference on Information Security and Cryptology (pp. 20–36). Seoul, Korea.Google Scholar
  52. Nokia Instant Community. (2010a). Accessed 20 June 2012.
  53. Nokia Instant Community. (2010b). Accessed 20 June 2012.
  54. Nokia. (2012). Mobile Data Challenge. Workshop in Pervasive 2012. Newcastle, UK. Accessed August 31, 2013.
  55. O’Donovan, J., & Smyth, B. (2006). Trust in recommender systems. In IUI’05 (pp. 167–174).Google Scholar
  56. Ott, J., Hyytiä, E., Lassila, P. E., Kangasharju, J., & Santra, S. (2011). Floating content for probabilistic information sharing. Pervasive and Mobile Computing, 7(6), 671–689.CrossRefGoogle Scholar
  57. Polat, H., & Du. W.L. (2005). Privacy-preserving top-n recommendation on horizontally partitioned data. In The 2005 IEEE/WIC/ACM International Conference on Web Intelligence Compiegne University of Technology, France. (pp. 725–731).Google Scholar
  58. Paulos, E. and Goodman, G. (2002). Accessed 20 June 2012.
  59. Raya, M., Papadimitratos, P., Gligory, VD. et al. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM, Phoenix, AZ, US. 1912–1920.Google Scholar
  60. Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40(3), 56–58.CrossRefGoogle Scholar
  61. Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In M. Baye (Ed.), The economics of the Internet and e-commerce (Advances in applied microeconomics, Vol. 11, pp. 127–157). Amsterdam: Elsevier.CrossRefGoogle Scholar
  62. Resnick, P., Kuwabara, K., Zeckhauser, R., et al. (2000). Reputation systems. Communications of the ACM, 43(12), 45–48.CrossRefGoogle Scholar
  63. Sadeh, N., Hong, J., Cranor, L., et al. (2009). Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6), 401–412.CrossRefGoogle Scholar
  64. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Proceedings of 24th International Conference on the Theory and Application of Cryptographic Techniques (pp. 457–473). Aarhus, Denmark.Google Scholar
  65. Seetharam, A., & Ramakrishnan, R. (2008). A context-sensitive, yet private experience towards a contextually apt recommendation of service. In IMSAA 2008 (pp. 1–6). Bangalore.Google Scholar
  66. Song, S., Hwang, K., Zhou, R., et al. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.CrossRefGoogle Scholar
  67. Stuedi, P., et al. (2008). Demo abstract ad hoc social networking using MAND., Accessed 25 June 2010
  68. Su, X., & Khoshgoftaar, T.M. (2009). A survey of collaborative filtering techniques. Advances in Artificial Intelligence 19p. doi:10.1155/2009/421425.Google Scholar
  69. Sun, Y., Yu, W., Han, Z., et al. (2006a). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Area in Communications, 24(2), 305–317.CrossRefMATHGoogle Scholar
  70. Sun, Y., Han, Y.Z., Yu, W. et al. (2006b). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. IEEE INFOCOM (pp. 1–13). Barcelona, Spain.Google Scholar
  71. Sun, Y., Han, Z., & Liu, K. J. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRefGoogle Scholar
  72. Tada, M., Kikuchi, H., Puntheeranurak, S. (2010). Privacy-preserving collaborative filtering protocol based on similarity between items. AINA’10 (pp. 573–578). Perth, Australia.Google Scholar
  73. Tang, Y., Krasser, S., He, Y. et al. (2008). Support vector machines and random forests modeling for spam senders behavior analysis. In IEEE GLOBECOM (pp. 1–5). New Orleans, LA, US.Google Scholar
  74. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–332.CrossRefGoogle Scholar
  75. Trifunovic, S., Legendre, F., Anastasiades, C. (2010). Social trust in opportunistic networks. IEEE INFOCOM Workshops, 1–6. San Diego, CA, US.Google Scholar
  76. Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.CrossRefGoogle Scholar
  77. Walsh, K., & Sirer, E.G. (2005) Fighting peer-to-peer SPAM and decoys with object reputation. In Proceedings of P2PECON (pp. 138–143). Philadelphia, Pennsylvania, USA.Google Scholar
  78. Wang, J. (2010). Mining context-related sequential patterns for recommendation systems. In CAMP’10 (pp. 270–275). Shah Alam, Malaysia.Google Scholar
  79. Wang, G., Liu, Q., Wu, J. (2010). Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security (Poster) (pp. 735–737). Hyatt Regency Chicago, Chicago, IL, USA.Google Scholar
  80. Wu, B. et al. (2006). Topical TrustRank: Using topicality to combat web spam. In WWW ‘06: Proceedings of the 15th international conference on World Wide Web (pp. 63–72). Edinburgh, Scortland.Google Scholar
  81. Xiao, H. (2010). An approach for context-aware service discovery and recommendation. In IEEE ICWS’10 (pp. 163–170). Miami, Florida, USA.Google Scholar
  82. Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.CrossRefGoogle Scholar
  83. Yan, Z. (Ed.). (2010). Trust modeling and management in digital environments: From social concept to system development. Hershey: IGI Global.Google Scholar
  84. Yan, Z., & Chen, Y. (2010). AdContRep: A privacy-enhanced reputation system for MANET content services. In UIC 2010, LNCS 6406, (pp. 414–429). Xi’an, China.Google Scholar
  85. Yan, Z., & Chen, Y. (2011). AdChatRep: A reputation system for MANET chatting. In SCI2011 in UbiComp2011 (pp. 43–48). Beijing, China.Google Scholar
  86. Yan, Z., & Holtmanns, S. (2008). Trust modeling and management: From social trust to digital trust. In R. Subramanian (Ed.), Computer security, privacy and politics: Current issues, challenges, and solutions (pp. 290–323). Hershey: Idea Group.CrossRefGoogle Scholar
  87. Yan, Z., & Niemi, V. (2009). A methodology towards usable trust management. In Proceedings of ATC’09, LNCS 5586 (pp. 179–193). Brisbane, Australia.Google Scholar
  88. Yan, Z., & Zhang, P. (2011). AdPriRec: A context-aware recommender system for user privacy in MANET services. In UIC2011, LNCS 6905 (pp. 295–309). Banff, Canada.Google Scholar
  89. Yan, Z., Liu, C., Niemi, V., Yu, G. (2009). Trust information indication: Effects of displaying trust information on mobile application usage (Technical Report No. NRC-TR-2009-004). Nokia Research Center.
  90. Yan, Z., Zhang, P., & Deng, R. H. (2012a). TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications. Journal of Personal and Ubiquitous Computing, 16(5), 485–506. Springer.CrossRefGoogle Scholar
  91. Yan, Z., Kantola, R., Shen, Y. (2012b). Unwanted traffic control via hybrid trust management. In IEEE TrustCom 2012. Liverpool, UK.Google Scholar
  92. Yang, Y., Sun, Y., Kay, S. et al. (2002). Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In SAC’09, 2009 (pp. 1308–1315). Hawaii, USA.Google Scholar
  93. Yap, G. (2007). Discovering and exploiting causal dependencies for robust mobile context-aware recommenders. IEEE Transactions on Knowledge and Data Engineering, 19(7), 977–992.CrossRefGoogle Scholar
  94. Yu, Z., Zhou, X., Zhang, D., et al. (2006). Supporting context-aware media recommendations for smart phones. IEEE Pervasive Computing, 5(3), 68–75.CrossRefGoogle Scholar
  95. Zhang, J. (2010). MailTrust: A mail reputation mechanism based on improved TrustGuard. In International Conference on Communications and Mobile Computing (CMC) (pp. 218–222). Shenzhen, China.Google Scholar
  96. Zhang, D., & Yu, Z. (2007). Spontaneous and context-aware media recommendation in heterogeneous spaces. In IEEE VTC’07 (pp. 267–271). Baltimore, MD, USA.Google Scholar
  97. Zhang, H., Duan, H., Liu, W. et al. (2009a). IPGroupRep: A novel reputation-based system for anti-spam. In Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 513–518). Brisbane, QLD.Google Scholar
  98. Zhang, X., Han, B., Liang, W. (2009b). Automatic seed set expansion for trust propagation based on anti-spamming algorithms. In WIDM’09, Proceeding of the Eleventh International Workshop on Web Information and Data Management (pp. 31–38). HongKong, China.Google Scholar
  99. Zouridaki, C., Mark, B.L., Hejmo, M. et al. (2006). Robust cooperative trust establishment for MANETs. In SASN ’06: Proceedings of the fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 23–24). Alexandria, VA, USA.Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Zheng Yan
    • 1
    • 2
  • Valtteri Niemi
    • 3
  • Yu Chen
    • 4
  • Peng Zhang
    • 5
  • Raimo Kantola
    • 2
  1. 1.The State Key Laboratory of ISNXidian UniversityXi’anChina
  2. 2.Department of ComNetAalto UniversityEspooFinland
  3. 3.Department of Mathematics and StatisticsUniversity of TurkuTurkuFinland
  4. 4.Human Computer Interaction GroupEPFLLausanneSwitzerland
  5. 5.Xi’an University of Post and TelecommunicationsXi’anChina

Personalised recommendations