Skip to main content

End-to-End Security in Delay Tolerant Mobile Social Network

  • Conference paper
  • First Online:
Applications of Computing and Communication Technologies (ICACCT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 899))

Abstract

In a Delay Tolerant Mobile Social Network (MSN) it is very difficult to maintain end-to-end security, which makes it vulnerable to various attacks like black hole attack, spoofing, modifies routing packets, packets dropping and many more. Apart from the attacks, there are various challenges in security of MSN like access control, confidentiality and intrusion detection system. Previously proposed model for security mechanism like efficient certificateless aggregate signature scheme provides security without the headache of maintaining the certificate, but the cost of signature verification is very high. So, to resolve these problems we are using HIBE (Hierarchical Identity Based Encryption) and proposing SPCRP (Secure Profile Cast Routing Protocol) which will provide end-to-end security along with the efficient key management, fine grained revocation and make sure the authorized access. We used ONE (Opportunistic Network) simulator with Profile Cast Routing protocol and observed various parameter overhead_ratio, number of messages transmitted, threshold value. We can conclude that this secure environment provides integrity, confidentiality and didn’t reveal the behavioural profile of the users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nguyen, H.: Mobile social network and its open research problems. Department of Computer Science, University of Houston, Houston (2010)

    Google Scholar 

  2. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_26

    Chapter  Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  4. Keränen, A., Ott, J., Kärkkäinen T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009)

    Google Scholar 

  5. Leguay, J., Friedman, T., Conan V.: Evaluating mobility pattern space routing for DTNs. In: Proceedings of IEEE INFOCOM (2006)

    Google Scholar 

  6. Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks. Technical report CS-200006, Duke University (2000)

    Google Scholar 

  7. Daly, E., Haahr, M.: Social network analysis for routing in disconnected delay-tolerant MANETs. In: Proceedings of ACM MOBIHOC (2007)

    Google Scholar 

  8. Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: social-based forwarding in delay tolerant ZNetworks. In: Proceedings of ACM MOBIHOC (2008)

    Google Scholar 

  9. Motani, M., Srinivasan, V., Nuggehalli, P.: PeopleNet: engineering a wireless virtual social network. In: Proceedings of MOBICOM 2005 (2005)

    Google Scholar 

  10. Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. In: Dini, P., Lorenz, P., de Souza, J.N. (eds.) SAPIR 2004. LNCS, vol. 3126, pp. 239–254. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27767-5_24

    Chapter  Google Scholar 

  11. Thomas, M., Gupta, A., Keshav, S.: Group based routing in disconnected ad hoc networks. In: Proceedings of 13th Annual IEEE International Conference on High Performance Computing (2006)

    Google Scholar 

  12. Perkins, C.E., Belding-Royer, E.M.: Ad-hoc on-demand distance vector routing. In: WMCSA, pp. 90–100 (1999)

    Google Scholar 

  13. Hsu, W.J., Dutta, D., Helmy, A.: CSI: a paradigm for behavior-oriented profile-cast services in mobile networks. Ad Hoc Netw. 10(8), 1586–1602 (2012)

    Article  Google Scholar 

  14. Vastardis, N., Yang, K.: Mobile social networks: architectures, social properties and key research challenges. IEEE Commun. Surv. Tutor. 15(3), 1355–1371 (2013)

    Article  Google Scholar 

  15. Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X.S.: Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31(9), 641–655 (2013)

    Article  Google Scholar 

  16. Liu, H., Liang, M.: Efficient identity-based hierarchical access authentication protocol for mobile network. Secur. Commun. Netw. 6(12), 1509–1521 (2013)

    Article  Google Scholar 

  17. Li, M., Yu, S., Cao, N., Lou, W.: Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Trans. Wirel. Commun. 12(5), 2024–2033 (2013)

    Article  Google Scholar 

Download references

Acknowledgement

This research has been partially supported by the Council of Scientific and Industrial Research, a research and development organization in India, with sanctioned no. 09/263(1054)/2015-EMR-I.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. P. Katti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rani, R., Katti, C.P. (2018). End-to-End Security in Delay Tolerant Mobile Social Network. In: Deka, G., Kaiwartya, O., Vashisth, P., Rathee, P. (eds) Applications of Computing and Communication Technologies. ICACCT 2018. Communications in Computer and Information Science, vol 899. Springer, Singapore. https://doi.org/10.1007/978-981-13-2035-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2035-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2034-7

  • Online ISBN: 978-981-13-2035-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics