ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications

ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications

Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi
DOI: 10.4018/ijertcs.2013070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The recent rise and widespread adoption of wireless networked embedded systems for mobile communication applications has sparked numerous visions of an ever more networked and interactive world. One such vision proposed in the past years are wireless ad hoc social networks, where wireless ad hoc communication and mobile devices are combined with integrated social characteristics to exchange data related games, rumors, and interesting information. However, they are still faces many challenges including routing security and privacy preservation. In this paper, the authors propose an Efficient Conditional Privacy preservation scheme with Demand Response, called ECPDR, for implement an effective information security, and achieving privacy preservation of message transmitted over wireless ad hoc social networks. They choose Ad hoc On demand Distance Vector (AODV) as a reactive routing protocol. This routing protocol has been extended to include the necessary parameters to perform the cryptographic operations at the nodes. Based on the cooperative neighbor and the short signatures technique, the proposed ECPDR scheme can not only detect and avoid but also can preserves the message privacy against elemental attacks and compound attacks. Extensive analyses and experiments are given to demonstrate its high detection rate and practicability under various scenarios.
Article Preview
Top

Introduction

The advancement and wide deployment of wireless communication technologies have revolutionized our lifestyles by providing the best ever convenience and flexibility in accessing Internet services and various types of personal communication applications. Today, everyone on the Internet knows the buzzword “social networking” (Lu, 2012). Social networking once began in the online space such as Facebook, Myspace, Youtube, Flickr with hundred millions of users. This online social networking can also be useful in cases such as conferences, exhibitions, meetings, stages, galleries where people want to meet and receive the latest news stories, share experiences with other people, etc. However, the social networking service quickly spread to mobile platforms where people carry their interesting multimedia content in powerful personal devices such as laptops, Smartphone, PDA and want to share with their friends or find people who have similar interests (Ferrag et al., 2013a). Social networking on mobile equipment can be classified in two categories depending on architecture: with infrastructure such as (Bender, 2009; Guha, 2008; Yeung, 2009) and without infrastructure such as (Emre, 2009; Ferrag, 2012b, 2013a; Lee and Hong, 2011; Li, 2013; Sanguankotchakorn, 2012). In our work, we are interested in social networks in an environment without infrastructure (IETF MANET group).

A number of challenging problems are introduced when trying to design and implement distributed social network applications operating within a networked embedded system. When developing social applications, designers do not have to explicitly deal with problems related to distribution, such as security, privacy, heterogeneity, scalability, resource sharing and fault tolerance. On the one hand, nowadays, security is a major challenge in computer science and embedded wireless networks is one of the hot topics due to their specificities: relatively easy access to the network nodes, open communication media. On the other hand, since the social characteristics (human mobility, selfish status, and preferences) are considered in the study of distributed social network applications become more promising and richer than that in the pure distributed network applications. As a result, we are motivated in this special issue which focuses on networked embedded systems to study the social characteristics and their impacts on distributed network applications, and address the challenging security and privacy issues related to them.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 2 Issues (2018)
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing