Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks

被引:6
|
作者
Freudiger, Julien [1 ]
Jadliwala, Murtuza [2 ]
Hubaux, Jean-Pierre [1 ]
Niemi, Valtteri [3 ]
Ginzboorg, Philip [3 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Wichita State Univ, Wichita, KS 67260 USA
[3] Nokia Res Ctr, Helsinki, Finland
来源
MOBILE NETWORKS & APPLICATIONS | 2013年 / 18卷 / 03期
关键词
wireless peer-to-peer networks; community pseudonyms; community privacy;
D O I
10.1007/s11036-012-0406-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing complementary services including real-time friend and community detection and localized data sharing without infrastructure requirement. After years of research, the deployment of such peer-to-peer wireless networks is finally being considered. A fundamental primitive is the ability to discover geographic proximity of specific communities of people (e. g, friends or neighbors). To do so, mobile devices must exchange some community identifiers or messages. We investigate privacy threats introduced by such communications, in particular, adversarial community detection. We use the general concept of community pseudonyms to abstract anonymous community identification mechanisms and define two distinct notions of community privacy by using a challenge-response methodology. An extensive cost analysis and simulation results throw further light on the feasibility of these mechanisms in the upcoming generation of wireless peer-to-peer networks.
引用
收藏
页码:413 / 428
页数:16
相关论文
共 50 条
  • [11] A Novel Peer Selection Mechanism in Heterogeneous Wireless Peer-to-Peer Networks
    Ren, Shoushou
    Liu, Yinlong
    Zhou, Xu
    Tang, Hui
    Ci, Song
    Wang, Min
    [J]. 2013 19TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2013,
  • [12] Study on Privacy Protection and Anonymous Communication in Peer-to-Peer Networks
    Chao, Gao
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 522 - 525
  • [13] Peer-to-Peer Networks
    Lin Yu1
    2. Peking University
    [J]. ZTE Communications, 2006, (01) : 53 - 57
  • [14] Peer-to-peer networks
    Fox, G
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2001, 3 (03) : 75 - 77
  • [15] Wireless goes peer-to-peer?
    Dornan, Andy
    [J]. Network Magazine, 2003, 18 (09): : 44 - 47
  • [16] Simple Peer-to-Peer SIP Privacy
    Koskela, Joakim
    Tarkoma, Sasu
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 226 - +
  • [17] Zoning method for the routing optimization in wireless peer-to-peer networks
    School of Information and Communication Engineering, Dalian University of Technology, Dalian , China
    [J]. Dynich, Andrei, 1600, Binary Information Press (10):
  • [18] On the capacity of wireless peer-to-peer networks with transmitter and receiver cooperation
    Oezbilgin, Tugba
    Sunay, M. Oguz
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 1817 - 1821
  • [19] Peer-to-Peer File Sharing over Wireless Mesh Networks
    Al Asaad, Amr
    Gopalakrishnan, Sathish
    Leung, Victor
    [J]. 2009 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 697 - 702
  • [20] An inexpensive unstructured platform for wireless mobile peer-to-peer networks
    Akon, Mursalin
    Shen, Xuemin
    Naik, Sagar
    Singh, Ajit
    Zhang, Qian
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2008, 1 (01) : 75 - 90