Abstract
Social networking makes digital communication technologies sharpening tools for extending our social circle. It has already become an important integral part of our daily lives, enabling us to contact our friends and families. In the meantime, fueled by the pervasive adoption of smartphones, we have a growing tendency to access our social networks more often by smartphones than desktop computers or laptops [1]. With smartphones, we are able to check the digital personal schedules when lying in bed; read and reply to emails in the meeting room; contact friends to have a lunch together on the way to the mall; and send photos to families in the tourist areas. In other words, with smartphones, we are more capable of creating, implementing and managing of novel and efficient mobile applications. In nowadays, the pervasive use of mobile applications and the social connections fosters a promising mobile social network (MSN) where reliable, comfortable and efficient computation and communication tools are provided to improve the quality of our work and life.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Stanley, Tablet demand and disruption mobile users come of age, Tech. Rep., 2011
K. Puttaswamy, S. Wang, T. Steinbauer, D. Agrawal, A. El Abbadi, C. Kruegel, B. Zhao, Preserving location privacy in geo-social applications. IEEE Trans. Mob. Comput. (2012), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6365638
H. Li, H. Hu, J. Xu, Nearby friend alert: location anonymity in mobile geo-social networks. IEEE Pervasive Comput. (2012), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6392162
M. Motani, V. Srinivasan, P. Nuggehalli, Peoplenet: engineering a wireless virtual social network, in MOBICOM (2005), pp. 243–257
X. Liang, X. Li, R. Lu, X. Lin, X. Shen, Seer: a secure and efficient service review system for service-oriented mobile social networks, in International Conference on Distributed Computing Systems (2012), pp. 647–656
M. Brereton, P. Roe, M. Foth, J.M. Bunker, L. Buys, Designing participation in agile ridesharing with mobile social software, in OZCHI (2009), pp. 257–260
Vanpool market action plan. Victoria Transport Policy Institute, Tech. Rep., 2003
M. Conti, S. Giordano, Multihop ad hoc networking: the theory. IEEE Commun. Mag. 45(4), 78–86 (2007)
K. Viswanath, K. Obraczka, G. Tsudik, Exploring mesh and tree-based multicast routing protocols for manets. IEEE Trans. Mob. Comput. 5(1), 28–42 (2006)
K.M.E. Defrawy, G. Tsudik, Alarm: anonymous location-aided routing in suspicious manets. IEEE Trans. Mob. Comput. 10(9), 1345–1358 (2011)
K. Sohrabi, J. Gao, V. Ailawadhi, G. Pottie, Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 7(5), 16–27 (2000)
X. Li, H. Frey, N. Santoro, I. Stojmenovic, Strictly localized sensor self-deployment for optimal focused coverage. IEEE Trans. Mob. Comput. 10(11), 1520–1533 (2011)
X. Li, I. Lille, R. Falcón, A. Nayak, I. Stojmenovic, Servicing wireless sensor networks by mobile robots. IEEE Commun. Mag. 50(7), 147–154 (2012)
K.R. Fall, A delay-tolerant network architecture for challenged internets, in Special Interest Group on Data Communication (2003), pp. 27–34
H. Zhu, X. Lin, R. Lu, Y. Fan, X. Shen, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)
Q. Li, S. Zhu, G. Cao, Routing in socially selfish delay tolerant networks, in Proceedings of IEEE INFOCOM (2010), pp. 857–865
R. Lu, X. Lin, X. Shen, Spring: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in Proceedings of IEEE INFOCOM (2010), pp. 632–640
F. Li, Y. Wang, Routing in vehicular ad hoc networks: a survey. IEEE Veh. Technol. Mag. 2(2), 12–22 (2007)
M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
A. Wasef, R. Lu, X. Lin, X. Shen, Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel. Commun. 17(5), 22–28 (2010)
R. Lu, X. Lin, H. Luan, X. Liang, X. Shen, Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2011)
W. Dong, V. Dave, L. Qiu, Y. Zhang, Secure friend discovery in mobile social networks, in Proceedings of IEEE INFOCOM (2011), pp. 1647–1655
G. Chen, F. Rahman, Analyzing privacy designs of mobile social networking applications, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 2 (2008), pp. 83–88
M. Li, N. Cao, S. Yu, W. Lou, Findu: privacy-preserving personal profile matching in mobile social networks, in Proceedings of IEEE INFOCOM (2011), pp. 2435–2443
X. Liang, X. Li, T.H. Luan, R. Lu, X. Lin, X. Shen, Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans. Veh. Technol. 7(61), 3209–3222 (2012)
S. Gaonkar, J. Li, R.R. Choudhury, L.P. Cox, A. Schmidt, Micro-blog: sharing and querying content through mobile phones and social participation, in Mobile Systems, Applications, and Services (2008), pp. 174–186
R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mhealthcare social network. ACM Mob. Netw. Appl. (MONET) 16(6), 683–694 (2011)
R. Zhang, Y. Zhang, J. Sun, G. Yan, Fine-grained private matching for proximity-based mobile social networking, in Proceedings of IEEE INFOCOM (2012), pp. 1969–1977
Z. Yang, B. Zhang, J. Dai, A.C. Champion, D. Xuan, D. Li, E-smalltalker: a distributed mobile system for social networking in physical proximity, in International Conference on Distributed Computing Systems (2010), pp. 468–477
K. Lee, S. Hong, S.J. Kim, I. Rhee, S. Chong, Slaw: a new mobility model for human walks, in Proceedings of IEEE INFOCOM (2009), pp. 855–863
I. Rhee, M. Shin, S. Hong, K. Lee, S.J. Kim, S. Chong, On the levy-walk nature of human mobility. IEEE/ACM Trans. Netw. 19(3), 630–643 (2011)
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/infocom2006 (v. 2009-05-29), 2009
N. Eagle, A. Pentland, Reality mining: sensing complex social systems. Pers. Ubiquitous Comput. 10(4), 255–268 (2006)
J. Yeo, D. Kotz, T. Henderson, Crawdad: a community resource for archiving wireless data at dartmouth. Comput. Commun. Rev. 36(2), 21–22 (2006)
F. Fukuyama, Trust: Social Virtues and the Creation of Prosperity (Free Press, New York, 1995)
A. Colman, Cooperation, psychological game theory, and limitations of rationality in social interaction. Behav. Brain Sci. 26(02), 139–153 (2003)
M. Wubben, Social Functions of Emotions in Social Dilemmas, Rotterdam, 2010
T. Ketelaar, W.T. Au, The effects of feelings of guilt on the behaviour of uncooperative individuals in repeated social bargaining games: an effect-as-information interpretation of the role of emotion in social interaction. Cogn. Emot. 17(3), 429–453 (2003)
W. Wang, X.-Y. Li, Y. Wang, Truthful multicast routing in selfish wireless networks, in MobiCom (2004), pp. 245–259
Z. Li, H. Shen, Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)
D. McMillan, D. Chavis, Sense of community: a definition and theory. J. Community Psychol. 14(1), 6–23 (1986)
D. Perkins, P. Florin, R. Rich, A. Wandersman, D. Chavis, Participation and the social and physical environment of residential blocks: crime and community context. Am. J. Community Psychol. 18(1), 83–115 (1990)
S. Okasha, Altruism, group selection and correlated interaction. Br. J. Philos. Sci. 56(4), 703–725 (2005)
A. Mei, G. Morabito, P. Santi, J. Stefa, Social-aware stateless forwarding in pocket switched networks, in Proceedings of IEEE INFOCOM (2011), pp. 251–255
E.M. Daly, M. Haahr, Social network analysis for routing in disconnected delay-tolerant manets, in MobiHoc (2007), pp. 32–40
P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in delay tolerant networks, in MobiHoc (2008), pp. 241–250
J. Fan, Y. Du, W. Gao, J. Chen, Y. Sun, Geography-aware active data dissemination in mobile social networks, in Mobile Adhoc and Sensor Systems (2010), pp. 109–118
P. Hui, E. Yoneki, S.Y. Chan, J. Crowcroft, Distributed community detection in delay tolerant networks, in Proceedings of 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture, ser. MobiArch (ACM, New York, 2007), pp. 1–8
N.P. Nguyen, T.N. Dinh, S. Tokala, M.T. Thai, Overlapping communities in dynamic networks: their detection and mobile applications, in MOBICOM (2011), pp. 85–96
P. Hui, E. Yoneki, J. Crowcroft, S.Y. Chan, Identifying social communities in complex communications for network efficiency, in Complex Sciences Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 4, (2009), pp. 351–363
P.V. Marsden, Egocentric and sociocentric measures of network centrality. Complex (1) 24(4), 407–422 (2002)
D. Pointcheval, J. Stern, Security proofs for signature schemes, in EUROCRYPT (1996), pp. 387–398
X. Boyen, B. Waters, Full-domain subgroup hiding and constant-size group signatures, Public Key Cryptography – PKC 2007 Lecture Notes in Computer Science 4450, (2007), pp. 1–15
X. Liang, Z. Cao, J. Shao, H. Lin, Short group signature without random oracles, in International Conference on Information and Communications Security Lecture Notes in Computer Science 4861, (2007), pp. 69–82
X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, X. Shen, Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31(9), 641–655 (2013)
B. Viswanath, A. Post, P.K. Gummadi, A. Mislove, An analysis of social network-based sybil defenses, in Special Interest Group on Data Communication (2010), pp. 363–374
A. Mohaisen, N. Hopper, Y. Kim, Keep your friends close: incorporating trust into social network-based sybil defenses, in Proceedings of IEEE INFOCOM (2011), pp. 1943–1951
W. Wei, F. Xu, C.C. Tan, Q. Li, Sybildefender: defend against sybil attacks in large social networks, in Proceedings of IEEE INFOCOM (2012), pp. 1951–1959
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M.J. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: crowdsourcing sybil detection. in CoRR, vol. abs/1205.3856 (2012)
X. Liang, X. Lin, X. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Trans. Parallel Distrib. Syst. (2013), ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6463403
R. Gross, A. Acquisti, H.J. Heinz III, Information revelation and privacy in online social networks, in Workshop on Privacy in the Electronic Society (2005), pp. 71–80
F. Stutzman, An evaluation of identity-sharing behavior in social network communities. iDMAa J. 3(1), 10–18 (2006)
K.P.N. Puttaswamy, A. Sala, B.Y. Zhao, Starclique: guaranteeing user privacy in social networks against intersection attacks, in Conference on emerging Networking EXperiments and Technologies (2009), pp. 157–168
E. Zheleva, L. Getoor, To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, in World Wide Web (2009), pp. 531–540
B. Falchuk, S. Loeb, Privacy enhancements for mobile and social uses of consumer electronics. IEEE Commun. Mag. 48(6), 102–108 (2010)
F. Cuadrado, J.C. Dueñas, Mobile application stores: success factors, existing approaches, and future developments. IEEE Commun. Mag. 50(11), 160–167 (2012)
D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, H.-C. Wong, Secret handshakes from pairing-based key agreements, in IEEE Symposium on Security and Privacy (2003), pp. 180–196
M.J. Freedman, K. Nissim, B. Pinkas, Efficient private matching and set intersection, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3027, (2004), pp. 1–19
M. Jakobsson, J.-P. Hubaux, L. Buttyan, A micro-payment scheme encouraging collaboration in multi-hop cellular networks, in Financial Cryptography Lecture Notes in Computer Science 2742, (2003), pp. 15–33
V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, R. R. Rao, An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 4(2), 722–733 (2005)
S. Zhong, E.L. Li, Y.G. Liu, Y.R. Yang, On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques, in MOBICOM (2005), pp. 117–131
L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in ACM Conference on Computer and Communications Security (2003), pp. 122–130
P. Wang, P. Ning, D.S. Reeves, A k-anonymous communication protocol for overlay networks, in ACM Symposium on Information, Computer and Communications Security (2007), pp. 45–56
J. Freudiger, M.H. Manshaei, J.-P. Hubaux, D.C. Parkes, On non-cooperative location privacy: a game-theoretic analysis, in ACM Conference on Computer and Communications Security (2009), pp. 324–337
G. Box, G.M. Jenkins, G.C. Reinsel, Time Series Analysis: Forecasting and Control, 4th edn. (Wiley, New York, 2008)
X. Li, N. Mitton, D. Simplot-Ryl, Mobility prediction based neighborhood discovery for mobile ad hoc networks 6640, (2011), pp. 241–253
D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in CRYPTO (2001), pp. 213–229
F. Hess, Efficient identity based signature schemes based on pairings, in Selected Areas in Cryptography Lecture Notes in Computer Science 2595, (2003), pp. 310–324
C. Gentry, Z. Ramzan, Identity-based aggregate signatures, in Public Key Cryptography Lecture Notes in Computer Science 3958, (2006), pp. 257–273
A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology-EUROCRYPT 99 Lecture Notes in Computer Science 1592, (1999), pp. 223–238
M. Naehrig, K. Lauter, V. Vaikuntanathan, Can homomorphic encryption be practical? in Cloud Computing Security Workshop (2011), pp. 113–124
R. Lu, X. Liang, X. Li, X. Lin, X. Shen, Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)
I.F. Blake, V. Kolesnikov, Strong conditional oblivious transfer and computing on intervals, in ASIACRYPT (2004), pp. 515–529
J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in J. of Cryp. 26(2), 191–224 (2013)
D.J. Watts, Small worlds: the dynamics of networks between order and randomness. J. Artif. Soc. Soc. Simul. 7(2), (2004), http://jasss.soc.surrey.ac.uk/index_by_issue.html
C. Bron, J. Kerbosch, Finding all cliques of an undirected graph (algorithm 457). Commun. ACM 16(9), 575–576 (1973)
L. Kissner, D.X. Song, Privacy-preserving set operations, in Advances in Cryptology–CRYPTO Lecture Notes in Computer Science 3621, (2005), pp. 241–257
Q. Ye, H. Wang, J. Pieprzyk, Distributed private matching and set operations, in Information Security Practice and Experience Lecture Notes in Computer Science 4991, (2008), pp. 347–360
D. Dachman-Soled, T. Malkin, M. Raykova, M. Yung, Efficient robust private set intersection, in Applied Cryptography and Network Security Lecture Notes in Computer Science 5536, (2009), pp. 125–142
S. Jarecki, X. Liu, Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection, in Theory of Cryptography Lecture Notes in Computer Science 5444, (2009), pp. 577–594
C. Hazay, Y. Lindell, Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. J. Cryptol. 23(3), 422–456 (2010)
B. Goethals, S. Laur, H. Lipmaa, T. Mielikäinen, On private scalar product computation for privacy-preserving data mining, in Information Security and Cryptology–ICISC 2004 Lecture Notes in Computer Science 3506, (2005), pp. 104–120
A.C.-C. Yao, Protocols for secure computations (extended abstract), in Foundations of Computer Science (1982), pp. 160–164
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game or a completeness theorem for protocols with honest majority, in Symposium on Theory of Computing (1987), pp. 218–229
I. Ioannidis, A. Grama, M.J. Atallah, A secure protocol for computing dot-products in clustered and distributed environments, in International Conference on Parallel Processing (2002), pp. 379–384
Q. Yuan, I. Cardei, J. Wu, Predict and relay: an efficient routing in disruption-tolerant networks, in MobiHoc (2009), pp. 95–104
X. Lin, R. Lu, X. Liang, X. Shen, Stap: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in vanets, in Proceedings of IEEE INFOCOM (2011), pp. 2147–2155
H. Luan, L. Cai, J. Chen, X. Shen, F. Bai, Vtube: towards the media rich city life with autonomous vehicular content distribution, in Sensor, Mesh and Ad Hoc Communications and Networks (2011), pp. 359–367
A. Lindgren, A. Doria, O. Schelén, Probabilistic routing in intermittently connected networks, in ACM SIGMOBILE Mobile Computing and Communications Review 7(3), 19–20 (2003)
W. Gao, Q. Li, B. Zhao, G. Cao, Multicasting in delay tolerant networks: a social network perspective, in MobiHoc (2009), pp. 299–308
P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in delay-tolerant networks. IEEE Trans. Mob. Comput. 10(11), 1576–1589 (2011)
W. Yu, K.J.R. Liu, Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mob. Comput. 6(5), 507–521 (2007).
H. Zhu, X. Lin, R. Lu, Y. Fan, X. Shen, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)
M.H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, J.-P. Hubaux, Game theory meets network security and privacy. Ecole Polytechnique Fédérale de Lausanne (EPFL), Tech. Rep., September 2010, epfl-report-151965
M. Raya, R. Shokri, J.-P. Hubaux, On the tradeoff between trust and privacy in wireless ad hoc networks, in WISEC (2010), pp. 75–80
M. Mahmoud, X. Shen, Pis: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010)
Z. Li, H. Shen, Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)
C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, N.S.V. Rao, Privacy vulnerability of published anonymous mobility traces, in MobiCom (2010), pp. 185–196
M. Li, K. Sampigethaya, L. Huang, R. Poovendran, Swing & swap: user-centric approaches towards maximizing location privacy, in Workshop on Privacy in the Electronic Society (2006), pp. 19–28
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
K. Hoffman, D. Zage, C. Nita-Rotaru, A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1) (2009)
R. Lu, X. Lin, H. Zhu, X. Shen, B. Preiss, Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4), 1483–1493 (2010)
Social group, Wikipedia, http://en.wikipedia.org/wiki/Social_group
B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3494, (2005), pp. 114–127
D. Boneh, X. Boyen, Short signatures without random oracles, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3027, (2004), pp. 56–73
I. Wen, Factors affecting the online travel buying decision: a review. Int. J. Contemp. Hosp. Manag. 21(6), 752–765 (2009)
S. Dhar, U. Varshney, Challenges and business models for mobile location-based services and advertising. Commun. ACM 54(5), 121–128 (2011)
H. Rajan, M. Hosamani, Tisa: toward trustworthy services in a service-oriented architecture. IEEE Trans. Serv. Comput. 1(4), 201–213 (2008)
Y. Wang, L. Li, Two-dimensional trust rating aggregations in service-oriented applications. IEEE Trans. Serv. Comput. 4(4), 257–271 (2011)
E. Ayday, F. Fekri, Iterative trust and reputation management using belief propagation. IEEE Trans. Dependable Secure Comput. 9(3), 375–386 (2012)
A. Das, M.M. Islam, Securedtrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable Secure Comput. 9(2), 261–274 (2012)
J. Douceur, The sybil attack, in Peer-to-Peer Systems Lecture Notes in Computer Science 2429, (2002), pp. 251–260
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)
J. Newsome, E. Shi, D.X. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses, in ACM Proceedings of the 3rd international symposium on Information processing in sensor networks (2004), pp. 259–268
R. Lu, X. Lin, X. Liang, X. Shen, A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Liang, X., Lu, R., Lin, X., Shen, X. (2013). Overview. In: Security and Privacy in Mobile Social Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8857-6_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8857-6_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8856-9
Online ISBN: 978-1-4614-8857-6
eBook Packages: Computer ScienceComputer Science (R0)