Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 1067 Accesses

Abstract

Social networking makes digital communication technologies sharpening tools for extending our social circle. It has already become an important integral part of our daily lives, enabling us to contact our friends and families. In the meantime, fueled by the pervasive adoption of smartphones, we have a growing tendency to access our social networks more often by smartphones than desktop computers or laptops [1]. With smartphones, we are able to check the digital personal schedules when lying in bed; read and reply to emails in the meeting room; contact friends to have a lunch together on the way to the mall; and send photos to families in the tourist areas. In other words, with smartphones, we are more capable of creating, implementing and managing of novel and efficient mobile applications. In nowadays, the pervasive use of mobile applications and the social connections fosters a promising mobile social network (MSN) where reliable, comfortable and efficient computation and communication tools are provided to improve the quality of our work and life.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Stanley, Tablet demand and disruption mobile users come of age, Tech. Rep., 2011

    Google Scholar 

  2. K. Puttaswamy, S. Wang, T. Steinbauer, D. Agrawal, A. El Abbadi, C. Kruegel, B. Zhao, Preserving location privacy in geo-social applications. IEEE Trans. Mob. Comput. (2012), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6365638

  3. H. Li, H. Hu, J. Xu, Nearby friend alert: location anonymity in mobile geo-social networks. IEEE Pervasive Comput. (2012), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6392162

  4. M. Motani, V. Srinivasan, P. Nuggehalli, Peoplenet: engineering a wireless virtual social network, in MOBICOM (2005), pp. 243–257

    Google Scholar 

  5. X. Liang, X. Li, R. Lu, X. Lin, X. Shen, Seer: a secure and efficient service review system for service-oriented mobile social networks, in International Conference on Distributed Computing Systems (2012), pp. 647–656

    Google Scholar 

  6. M. Brereton, P. Roe, M. Foth, J.M. Bunker, L. Buys, Designing participation in agile ridesharing with mobile social software, in OZCHI (2009), pp. 257–260

    Google Scholar 

  7. Vanpool market action plan. Victoria Transport Policy Institute, Tech. Rep., 2003

    Google Scholar 

  8. M. Conti, S. Giordano, Multihop ad hoc networking: the theory. IEEE Commun. Mag. 45(4), 78–86 (2007)

    Article  Google Scholar 

  9. K. Viswanath, K. Obraczka, G. Tsudik, Exploring mesh and tree-based multicast routing protocols for manets. IEEE Trans. Mob. Comput. 5(1), 28–42 (2006)

    Article  Google Scholar 

  10. K.M.E. Defrawy, G. Tsudik, Alarm: anonymous location-aided routing in suspicious manets. IEEE Trans. Mob. Comput. 10(9), 1345–1358 (2011)

    Article  Google Scholar 

  11. K. Sohrabi, J. Gao, V. Ailawadhi, G. Pottie, Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 7(5), 16–27 (2000)

    Article  Google Scholar 

  12. X. Li, H. Frey, N. Santoro, I. Stojmenovic, Strictly localized sensor self-deployment for optimal focused coverage. IEEE Trans. Mob. Comput. 10(11), 1520–1533 (2011)

    Article  Google Scholar 

  13. X. Li, I. Lille, R. Falcón, A. Nayak, I. Stojmenovic, Servicing wireless sensor networks by mobile robots. IEEE Commun. Mag. 50(7), 147–154 (2012)

    Article  Google Scholar 

  14. K.R. Fall, A delay-tolerant network architecture for challenged internets, in Special Interest Group on Data Communication (2003), pp. 27–34

    Google Scholar 

  15. H. Zhu, X. Lin, R. Lu, Y. Fan, X. Shen, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)

    Article  Google Scholar 

  16. Q. Li, S. Zhu, G. Cao, Routing in socially selfish delay tolerant networks, in Proceedings of IEEE INFOCOM (2010), pp. 857–865

    Google Scholar 

  17. R. Lu, X. Lin, X. Shen, Spring: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in Proceedings of IEEE INFOCOM (2010), pp. 632–640

    Google Scholar 

  18. F. Li, Y. Wang, Routing in vehicular ad hoc networks: a survey. IEEE Veh. Technol. Mag. 2(2), 12–22 (2007)

    Article  Google Scholar 

  19. M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Google Scholar 

  20. A. Wasef, R. Lu, X. Lin, X. Shen, Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel. Commun. 17(5), 22–28 (2010)

    Article  Google Scholar 

  21. R. Lu, X. Lin, H. Luan, X. Liang, X. Shen, Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2011)

    Google Scholar 

  22. W. Dong, V. Dave, L. Qiu, Y. Zhang, Secure friend discovery in mobile social networks, in Proceedings of IEEE INFOCOM (2011), pp. 1647–1655

    Google Scholar 

  23. G. Chen, F. Rahman, Analyzing privacy designs of mobile social networking applications, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 2 (2008), pp. 83–88

    Google Scholar 

  24. M. Li, N. Cao, S. Yu, W. Lou, Findu: privacy-preserving personal profile matching in mobile social networks, in Proceedings of IEEE INFOCOM (2011), pp. 2435–2443

    Google Scholar 

  25. X. Liang, X. Li, T.H. Luan, R. Lu, X. Lin, X. Shen, Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans. Veh. Technol. 7(61), 3209–3222 (2012)

    Article  Google Scholar 

  26. S. Gaonkar, J. Li, R.R. Choudhury, L.P. Cox, A. Schmidt, Micro-blog: sharing and querying content through mobile phones and social participation, in Mobile Systems, Applications, and Services (2008), pp. 174–186

    Google Scholar 

  27. R. Lu, X. Lin, X. Liang, X. Shen, A secure handshake scheme with symptoms-matching for mhealthcare social network. ACM Mob. Netw. Appl. (MONET) 16(6), 683–694 (2011)

    Google Scholar 

  28. R. Zhang, Y. Zhang, J. Sun, G. Yan, Fine-grained private matching for proximity-based mobile social networking, in Proceedings of IEEE INFOCOM (2012), pp. 1969–1977

    Google Scholar 

  29. Z. Yang, B. Zhang, J. Dai, A.C. Champion, D. Xuan, D. Li, E-smalltalker: a distributed mobile system for social networking in physical proximity, in International Conference on Distributed Computing Systems (2010), pp. 468–477

    Google Scholar 

  30. K. Lee, S. Hong, S.J. Kim, I. Rhee, S. Chong, Slaw: a new mobility model for human walks, in Proceedings of IEEE INFOCOM (2009), pp. 855–863

    Google Scholar 

  31. I. Rhee, M. Shin, S. Hong, K. Lee, S.J. Kim, S. Chong, On the levy-walk nature of human mobility. IEEE/ACM Trans. Netw. 19(3), 630–643 (2011)

    Article  Google Scholar 

  32. J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/infocom2006 (v. 2009-05-29), 2009

    Google Scholar 

  33. N. Eagle, A. Pentland, Reality mining: sensing complex social systems. Pers. Ubiquitous Comput. 10(4), 255–268 (2006)

    Article  Google Scholar 

  34. J. Yeo, D. Kotz, T. Henderson, Crawdad: a community resource for archiving wireless data at dartmouth. Comput. Commun. Rev. 36(2), 21–22 (2006)

    Article  Google Scholar 

  35. F. Fukuyama, Trust: Social Virtues and the Creation of Prosperity (Free Press, New York, 1995)

    Google Scholar 

  36. A. Colman, Cooperation, psychological game theory, and limitations of rationality in social interaction. Behav. Brain Sci. 26(02), 139–153 (2003)

    Google Scholar 

  37. M. Wubben, Social Functions of Emotions in Social Dilemmas, Rotterdam, 2010

    Google Scholar 

  38. T. Ketelaar, W.T. Au, The effects of feelings of guilt on the behaviour of uncooperative individuals in repeated social bargaining games: an effect-as-information interpretation of the role of emotion in social interaction. Cogn. Emot. 17(3), 429–453 (2003)

    Article  Google Scholar 

  39. W. Wang, X.-Y. Li, Y. Wang, Truthful multicast routing in selfish wireless networks, in MobiCom (2004), pp. 245–259

    Google Scholar 

  40. Z. Li, H. Shen, Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)

    Article  Google Scholar 

  41. D. McMillan, D. Chavis, Sense of community: a definition and theory. J. Community Psychol. 14(1), 6–23 (1986)

    Article  Google Scholar 

  42. D. Perkins, P. Florin, R. Rich, A. Wandersman, D. Chavis, Participation and the social and physical environment of residential blocks: crime and community context. Am. J. Community Psychol. 18(1), 83–115 (1990)

    Article  Google Scholar 

  43. S. Okasha, Altruism, group selection and correlated interaction. Br. J. Philos. Sci. 56(4), 703–725 (2005)

    Article  Google Scholar 

  44. A. Mei, G. Morabito, P. Santi, J. Stefa, Social-aware stateless forwarding in pocket switched networks, in Proceedings of IEEE INFOCOM (2011), pp. 251–255

    Google Scholar 

  45. E.M. Daly, M. Haahr, Social network analysis for routing in disconnected delay-tolerant manets, in MobiHoc (2007), pp. 32–40

    Google Scholar 

  46. P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in delay tolerant networks, in MobiHoc (2008), pp. 241–250

    Google Scholar 

  47. J. Fan, Y. Du, W. Gao, J. Chen, Y. Sun, Geography-aware active data dissemination in mobile social networks, in Mobile Adhoc and Sensor Systems (2010), pp. 109–118

    Google Scholar 

  48. P. Hui, E. Yoneki, S.Y. Chan, J. Crowcroft, Distributed community detection in delay tolerant networks, in Proceedings of 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture, ser. MobiArch (ACM, New York, 2007), pp. 1–8

    Google Scholar 

  49. N.P. Nguyen, T.N. Dinh, S. Tokala, M.T. Thai, Overlapping communities in dynamic networks: their detection and mobile applications, in MOBICOM (2011), pp. 85–96

    Google Scholar 

  50. P. Hui, E. Yoneki, J. Crowcroft, S.Y. Chan, Identifying social communities in complex communications for network efficiency, in Complex Sciences Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 4, (2009), pp. 351–363

    Google Scholar 

  51. P.V. Marsden, Egocentric and sociocentric measures of network centrality. Complex (1) 24(4), 407–422 (2002)

    Google Scholar 

  52. D. Pointcheval, J. Stern, Security proofs for signature schemes, in EUROCRYPT (1996), pp. 387–398

    Google Scholar 

  53. X. Boyen, B. Waters, Full-domain subgroup hiding and constant-size group signatures, Public Key Cryptography – PKC 2007 Lecture Notes in Computer Science 4450, (2007), pp. 1–15

    Google Scholar 

  54. X. Liang, Z. Cao, J. Shao, H. Lin, Short group signature without random oracles, in International Conference on Information and Communications Security Lecture Notes in Computer Science 4861, (2007), pp. 69–82

    Google Scholar 

  55. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, X. Shen, Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31(9), 641–655 (2013)

    Article  Google Scholar 

  56. B. Viswanath, A. Post, P.K. Gummadi, A. Mislove, An analysis of social network-based sybil defenses, in Special Interest Group on Data Communication (2010), pp. 363–374

    Google Scholar 

  57. A. Mohaisen, N. Hopper, Y. Kim, Keep your friends close: incorporating trust into social network-based sybil defenses, in Proceedings of IEEE INFOCOM (2011), pp. 1943–1951

    Google Scholar 

  58. W. Wei, F. Xu, C.C. Tan, Q. Li, Sybildefender: defend against sybil attacks in large social networks, in Proceedings of IEEE INFOCOM (2012), pp. 1951–1959

    Google Scholar 

  59. G. Wang, M. Mohanlal, C. Wilson, X. Wang, M.J. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: crowdsourcing sybil detection. in CoRR, vol. abs/1205.3856 (2012)

    Google Scholar 

  60. X. Liang, X. Lin, X. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Trans. Parallel Distrib. Syst. (2013), ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6463403

  61. R. Gross, A. Acquisti, H.J. Heinz III, Information revelation and privacy in online social networks, in Workshop on Privacy in the Electronic Society (2005), pp. 71–80

    Google Scholar 

  62. F. Stutzman, An evaluation of identity-sharing behavior in social network communities. iDMAa J. 3(1), 10–18 (2006)

    Google Scholar 

  63. K.P.N. Puttaswamy, A. Sala, B.Y. Zhao, Starclique: guaranteeing user privacy in social networks against intersection attacks, in Conference on emerging Networking EXperiments and Technologies (2009), pp. 157–168

    Google Scholar 

  64. E. Zheleva, L. Getoor, To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, in World Wide Web (2009), pp. 531–540

    Google Scholar 

  65. B. Falchuk, S. Loeb, Privacy enhancements for mobile and social uses of consumer electronics. IEEE Commun. Mag. 48(6), 102–108 (2010)

    Article  Google Scholar 

  66. F. Cuadrado, J.C. Dueñas, Mobile application stores: success factors, existing approaches, and future developments. IEEE Commun. Mag. 50(11), 160–167 (2012)

    Article  Google Scholar 

  67. D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, H.-C. Wong, Secret handshakes from pairing-based key agreements, in IEEE Symposium on Security and Privacy (2003), pp. 180–196

    Google Scholar 

  68. M.J. Freedman, K. Nissim, B. Pinkas, Efficient private matching and set intersection, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3027, (2004), pp. 1–19

    Google Scholar 

  69. M. Jakobsson, J.-P. Hubaux, L. Buttyan, A micro-payment scheme encouraging collaboration in multi-hop cellular networks, in Financial Cryptography Lecture Notes in Computer Science 2742, (2003), pp. 15–33

    Google Scholar 

  70. V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, R. R. Rao, An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 4(2), 722–733 (2005)

    Article  Google Scholar 

  71. S. Zhong, E.L. Li, Y.G. Liu, Y.R. Yang, On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques, in MOBICOM (2005), pp. 117–131

    Google Scholar 

  72. L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Google Scholar 

  73. L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in ACM Conference on Computer and Communications Security (2003), pp. 122–130

    Google Scholar 

  74. P. Wang, P. Ning, D.S. Reeves, A k-anonymous communication protocol for overlay networks, in ACM Symposium on Information, Computer and Communications Security (2007), pp. 45–56

    Google Scholar 

  75. J. Freudiger, M.H. Manshaei, J.-P. Hubaux, D.C. Parkes, On non-cooperative location privacy: a game-theoretic analysis, in ACM Conference on Computer and Communications Security (2009), pp. 324–337

    Google Scholar 

  76. G. Box, G.M. Jenkins, G.C. Reinsel, Time Series Analysis: Forecasting and Control, 4th edn. (Wiley, New York, 2008)

    Google Scholar 

  77. X. Li, N. Mitton, D. Simplot-Ryl, Mobility prediction based neighborhood discovery for mobile ad hoc networks 6640, (2011), pp. 241–253

    Google Scholar 

  78. D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in CRYPTO (2001), pp. 213–229

    Google Scholar 

  79. F. Hess, Efficient identity based signature schemes based on pairings, in Selected Areas in Cryptography Lecture Notes in Computer Science 2595, (2003), pp. 310–324

    Google Scholar 

  80. C. Gentry, Z. Ramzan, Identity-based aggregate signatures, in Public Key Cryptography Lecture Notes in Computer Science 3958, (2006), pp. 257–273

    Google Scholar 

  81. A. Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  82. P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology-EUROCRYPT 99 Lecture Notes in Computer Science 1592, (1999), pp. 223–238

    Google Scholar 

  83. M. Naehrig, K. Lauter, V. Vaikuntanathan, Can homomorphic encryption be practical? in Cloud Computing Security Workshop (2011), pp. 113–124

    Google Scholar 

  84. R. Lu, X. Liang, X. Li, X. Lin, X. Shen, Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)

    Article  Google Scholar 

  85. I.F. Blake, V. Kolesnikov, Strong conditional oblivious transfer and computing on intervals, in ASIACRYPT (2004), pp. 515–529

    Google Scholar 

  86. J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in J. of Cryp. 26(2), 191–224 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  87. D.J. Watts, Small worlds: the dynamics of networks between order and randomness. J. Artif. Soc. Soc. Simul. 7(2), (2004), http://jasss.soc.surrey.ac.uk/index_by_issue.html

  88. C. Bron, J. Kerbosch, Finding all cliques of an undirected graph (algorithm 457). Commun. ACM 16(9), 575–576 (1973)

    Article  MATH  Google Scholar 

  89. L. Kissner, D.X. Song, Privacy-preserving set operations, in Advances in Cryptology–CRYPTO Lecture Notes in Computer Science 3621, (2005), pp. 241–257

    Google Scholar 

  90. Q. Ye, H. Wang, J. Pieprzyk, Distributed private matching and set operations, in Information Security Practice and Experience Lecture Notes in Computer Science 4991, (2008), pp. 347–360

    Google Scholar 

  91. D. Dachman-Soled, T. Malkin, M. Raykova, M. Yung, Efficient robust private set intersection, in Applied Cryptography and Network Security Lecture Notes in Computer Science 5536, (2009), pp. 125–142

    Google Scholar 

  92. S. Jarecki, X. Liu, Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection, in Theory of Cryptography Lecture Notes in Computer Science 5444, (2009), pp. 577–594

    Google Scholar 

  93. C. Hazay, Y. Lindell, Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. J. Cryptol. 23(3), 422–456 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  94. B. Goethals, S. Laur, H. Lipmaa, T. Mielikäinen, On private scalar product computation for privacy-preserving data mining, in Information Security and Cryptology–ICISC 2004 Lecture Notes in Computer Science 3506, (2005), pp. 104–120

    Google Scholar 

  95. A.C.-C. Yao, Protocols for secure computations (extended abstract), in Foundations of Computer Science (1982), pp. 160–164

    Google Scholar 

  96. O. Goldreich, S. Micali, A. Wigderson, How to play any mental game or a completeness theorem for protocols with honest majority, in Symposium on Theory of Computing (1987), pp. 218–229

    Google Scholar 

  97. I. Ioannidis, A. Grama, M.J. Atallah, A secure protocol for computing dot-products in clustered and distributed environments, in International Conference on Parallel Processing (2002), pp. 379–384

    Google Scholar 

  98. Q. Yuan, I. Cardei, J. Wu, Predict and relay: an efficient routing in disruption-tolerant networks, in MobiHoc (2009), pp. 95–104

    Google Scholar 

  99. X. Lin, R. Lu, X. Liang, X. Shen, Stap: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in vanets, in Proceedings of IEEE INFOCOM (2011), pp. 2147–2155

    Google Scholar 

  100. H. Luan, L. Cai, J. Chen, X. Shen, F. Bai, Vtube: towards the media rich city life with autonomous vehicular content distribution, in Sensor, Mesh and Ad Hoc Communications and Networks (2011), pp. 359–367

    Google Scholar 

  101. A. Lindgren, A. Doria, O. Schelén, Probabilistic routing in intermittently connected networks, in ACM SIGMOBILE Mobile Computing and Communications Review 7(3), 19–20 (2003)

    Google Scholar 

  102. W. Gao, Q. Li, B. Zhao, G. Cao, Multicasting in delay tolerant networks: a social network perspective, in MobiHoc (2009), pp. 299–308

    Google Scholar 

  103. P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in delay-tolerant networks. IEEE Trans. Mob. Comput. 10(11), 1576–1589 (2011)

    Article  Google Scholar 

  104. W. Yu, K.J.R. Liu, Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mob. Comput. 6(5), 507–521 (2007).

    Article  Google Scholar 

  105. H. Zhu, X. Lin, R. Lu, Y. Fan, X. Shen, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)

    Article  Google Scholar 

  106. M.H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, J.-P. Hubaux, Game theory meets network security and privacy. Ecole Polytechnique Fédérale de Lausanne (EPFL), Tech. Rep., September 2010, epfl-report-151965

    Google Scholar 

  107. M. Raya, R. Shokri, J.-P. Hubaux, On the tradeoff between trust and privacy in wireless ad hoc networks, in WISEC (2010), pp. 75–80

    Google Scholar 

  108. M. Mahmoud, X. Shen, Pis: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010)

    Article  Google Scholar 

  109. Z. Li, H. Shen, Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)

    Article  Google Scholar 

  110. C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, N.S.V. Rao, Privacy vulnerability of published anonymous mobility traces, in MobiCom (2010), pp. 185–196

    Google Scholar 

  111. M. Li, K. Sampigethaya, L. Huang, R. Poovendran, Swing & swap: user-centric approaches towards maximizing location privacy, in Workshop on Privacy in the Electronic Society (2006), pp. 19–28

    Google Scholar 

  112. D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  113. K. Hoffman, D. Zage, C. Nita-Rotaru, A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1) (2009)

    Google Scholar 

  114. R. Lu, X. Lin, H. Zhu, X. Shen, B. Preiss, Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4), 1483–1493 (2010)

    Article  Google Scholar 

  115. Social group, Wikipedia, http://en.wikipedia.org/wiki/Social_group

  116. B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3494, (2005), pp. 114–127

    Google Scholar 

  117. D. Boneh, X. Boyen, Short signatures without random oracles, in Advances in Cryptology-EUROCRYPT Lecture Notes in Computer Science 3027, (2004), pp. 56–73

    Google Scholar 

  118. I. Wen, Factors affecting the online travel buying decision: a review. Int. J. Contemp. Hosp. Manag. 21(6), 752–765 (2009)

    Article  Google Scholar 

  119. S. Dhar, U. Varshney, Challenges and business models for mobile location-based services and advertising. Commun. ACM 54(5), 121–128 (2011)

    Article  Google Scholar 

  120. H. Rajan, M. Hosamani, Tisa: toward trustworthy services in a service-oriented architecture. IEEE Trans. Serv. Comput. 1(4), 201–213 (2008)

    Article  Google Scholar 

  121. Y. Wang, L. Li, Two-dimensional trust rating aggregations in service-oriented applications. IEEE Trans. Serv. Comput. 4(4), 257–271 (2011)

    Article  Google Scholar 

  122. E. Ayday, F. Fekri, Iterative trust and reputation management using belief propagation. IEEE Trans. Dependable Secure Comput. 9(3), 375–386 (2012)

    Article  Google Scholar 

  123. A. Das, M.M. Islam, Securedtrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable Secure Comput. 9(2), 261–274 (2012)

    Article  Google Scholar 

  124. J. Douceur, The sybil attack, in Peer-to-Peer Systems Lecture Notes in Computer Science 2429, (2002), pp. 251–260

    Google Scholar 

  125. C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)

    Article  Google Scholar 

  126. J. Newsome, E. Shi, D.X. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses, in ACM Proceedings of the 3rd international symposium on Information processing in sensor networks (2004), pp. 259–268

    Google Scholar 

  127. R. Lu, X. Lin, X. Liang, X. Shen, A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Liang, X., Lu, R., Lin, X., Shen, X. (2013). Overview. In: Security and Privacy in Mobile Social Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8857-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8857-6_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8856-9

  • Online ISBN: 978-1-4614-8857-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics