Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

European Symposium on Research in Computer Security

ESORICS 2012: Computer Security – ESORICS 2012 pp 181–198Cite as

  1. Home
  2. Computer Security – ESORICS 2012
  3. Conference paper
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks

  • Adam J. Aviv19,
  • Micah Sherr20,
  • Matt Blaze19 &
  • …
  • Jonathan M. Smith19 
  • Conference paper
  • 3514 Accesses

  • 9 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7459)

Abstract

This paper introduces a privacy-aware geographic routing protocol for Human Movement Networks (HumaNets). HumaNets are fully decentralized opportunistic and delay-tolerate networks composed of smartphone devices. Such networks allow participants to exchange messages phone-to-phone and have applications where traditional infrastructure is unavailable (e.g., during a disaster) and in totalitarian states where cellular network monitoring and censorship are employed. Our protocol leverages self-determined location profiles of smartphone operators’ movements as a predictor of future locations, enabling efficient geographic routing over metropolitan-wide areas. Since these profiles contain sensitive information about participants’ prior movements, our routing protocol is designed to minimize the exposure of sensitive information during a message exchange. We demonstrate via simulation over both synthetic and real-world trace data that our protocol is highly scalable, leaks little information, and balances privacy and efficiency: messages are 30% more likely to be delivered than similar random walk protocols, and the median latency is only 23-28% greater than epidemic protocols while requiring an order of magnitude fewer messages.

Keywords

  • Message Exchange
  • General Node
  • Universal Mobile Telecommunication System
  • Location Privacy
  • Universal Mobile Telecommunication System

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M.: Evading Cellular Data Monitoring with Human Movement Networks. In: USENIX Workshop on Hot Topics in Security (HotSec) (August 2010)

    Google Scholar 

  2. Grossglauser, M., Vetterli, M.: Locating mobile nodes with ease: learning efficient routes from encounter histories alone. IEEE/ACM Trans. Netw. 14(3), 457–469 (2006)

    CrossRef  Google Scholar 

  3. Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket Switched Networks and Human Mobility in Conference Environments. In: ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN (2005)

    Google Scholar 

  4. El Defrawy, K., Tsudik, G.: PRISM: Privacy-friendly Routing in Suspicious MANETs (and VANETs). In: International Conference on Network Protocols, ICNP (2008)

    Google Scholar 

  5. Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: An Efficient Secure Distributed Anonymous Routing Protocol for Mobile and Wireless Ad Hoc Networks. Computer Communications 28(10), 1193–1203 (2005)

    CrossRef  Google Scholar 

  6. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: ACM International Conference on Mobile Systems, Applications, and Services, MobiSys (2003)

    Google Scholar 

  7. Yao, A.C.: Protocols for Secure Computations. In: Symposium on Foundations of Computer Science, FOCS (1982)

    Google Scholar 

  8. Shikfa, A., Onen, M., Molva, R.: Privacy and Confidentiality in Context-Based and Epidemic Forwarding. Computer Communications 33(13), 1493–1504 (2010)

    CrossRef  Google Scholar 

  9. 3rd Generation Partnership Project: Universal Mobile Telecommunications System (UMTS); Synchronization in (UTRAN) Stage 2. Technical Specification Group Services and System Aspects 3GPP TS25.402 v8.1.0, 3rd Generation Partnership Project (July 2009)

    Google Scholar 

  10. Mann, P.: Timing Synchronization for 3G Wireless. EE Times Asia (December 2004)

    Google Scholar 

  11. Bilton, N.: Tracking File Found in iPhones. The New York Times (April 20, 2011)

    Google Scholar 

  12. Lee, K., Hong, S., Kim, S.J., Rhee, I., Chong, S.: SLAW: A New Mobility Model for Human Walks. In: IEEE International Conference on Computer Communications, INFOCOM (2009)

    Google Scholar 

  13. Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A Parsimonious Model of Mobile Partitioned Networks with Clustering. In: Conference on COMmunication Systems and NETworkS, COMSNETS (2009)

    Google Scholar 

  14. Rhee, I., Shin, M., Hong, S., Lee, K., Chong, S.: On the Levy-Walk Nature of Human Mobility. In: IEEE International Conference on Computer Communications, INFOCOM (2008)

    Google Scholar 

  15. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    CrossRef  Google Scholar 

  16. Lindgren, A., Doria, A., Schelén, O.: Probabilistic Routing in Intermittently Connected Networks. In: Dini, P., Lorenz, P., de Souza, J.N. (eds.) SAPIR 2004. LNCS, vol. 3126, pp. 239–254. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  17. Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On Non-cooperative Location Privacy: A Game-theoretic Analysis. In: ACM Conference on Computer and Communications Security, CCS (2009)

    Google Scholar 

  18. Zhang, Y., Liu, W., Lou, W., Fang, Y.: MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks. IEEE Transactions on Wireless Communications 5(9), 2376–2385 (2006)

    CrossRef  Google Scholar 

  19. Lu, X., Hui, P., Towsley, D., Pu, J., Xiong, Z.: Anti-localization Anonymous Routing for Delay Tolerant Network. Computer Networks 54(11), 1899–1910 (2010)

    CrossRef  MATH  Google Scholar 

  20. Husted, N., Myers, S.: Mobile Location Tracking in Metro Areas: Malnets and Others. In: ACM Conference on Computer and Communications Security, CCS (2010)

    Google Scholar 

  21. Sy, D., Chen, R., Bao, L.: ODAR: On-Demand Anonymous Routing in Ad Hoc Networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS (2006)

    Google Scholar 

  22. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, IETF (2003)

    Google Scholar 

  23. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. In: Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X) (October 2002)

    Google Scholar 

  24. Cheng, P., Weng, J., Tung, L., Lee, K., Gerla, M., Haerri, J.: GeoDTN+Nav: A Hybrid Geographic and Dtn Routing with Navigation Assistance in Urban Vehicular Networks. In: Symposium on Vehicular Computing Systems (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. University of Pennsylvania, USA

    Adam J. Aviv, Matt Blaze & Jonathan M. Smith

  2. Georgetown University, USA

    Micah Sherr

Authors
  1. Adam J. Aviv
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Micah Sherr
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Matt Blaze
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Jonathan M. Smith
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Informatica, Università degli Studi di Milano, Via Bramante 65, 26013, Crema, Italy

    Sara Foresti

  2. Computer Science Department, Columbia University, 1214 Amsterdam Avenue, 10025, New York, NY, US

    Moti Yung

  3. Institute of Informatics and Telematics, Information Security Group, National Research Council, Pisa Research Area, Via G. Moruzzi 1, 56125, Pisa, Italy

    Fabio Martinelli

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M. (2012). Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. In: Foresti, S., Yung, M., Martinelli, F. (eds) Computer Security – ESORICS 2012. ESORICS 2012. Lecture Notes in Computer Science, vol 7459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_11

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-33167-1_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33166-4

  • Online ISBN: 978-3-642-33167-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature