PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks

This paper introduces PRIVO, a PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. PRIVO models a DTN as a time-varying neighboring graph where edges correspond to the neighboring relationship among pairs of nodes. PRIVO ensures privacy by protecting each node's sensitive information even if it has to be processed elsewhere. In addition, nodes also compare their routing metrics in a private manner using the Paillier homomorphic encryption scheme. The effectiveness of PRIVO is supported through extensive simulations with synthetic mobility models and real mobility traces. Simulations results show that PRIVO presents on average cryptographic costs below 1% in most scenarios. Additionally, PRIVO presents on average gains of 22.2 % and 39.7 % in terms of delivery ratio for the synthetic and real scenarios considered, respectively.

[1]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[2]  Milena Radenkovic,et al.  Adaptive user anonymity for mobile opportunistic networks , 2012, CHANTS '12.

[3]  Ian Goldberg,et al.  Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.

[4]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[5]  Johan A. Pouwelse,et al.  Building a privacy-preserving semantic overlay for Peer-to-Peer networks , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Paolo Santi,et al.  Privacy-preserving interest-casting in opportunistic networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  R. Fisher FREQUENCY DISTRIBUTION OF THE VALUES OF THE CORRELATION COEFFIENTS IN SAMPLES FROM AN INDEFINITELY LARGE POPU;ATION , 1915 .

[8]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[9]  Ke Xu,et al.  A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues , 2014, IEEE Communications Surveys & Tutorials.

[10]  Chadi Assi,et al.  Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.

[11]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[12]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[13]  Thrasyvoulos Spyropoulos,et al.  Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Refik Molva,et al.  Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..

[15]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[16]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[17]  Lei Chen,et al.  A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.

[18]  Martin Everett,et al.  Ego network betweenness , 2005, Soc. Networks.

[19]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[20]  Susana Sargento,et al.  Opportunistic routing based on daily routines , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[21]  Dimitrios-Georgios Akestoridis CRAWDAD dataset uoi/haggle (v.2016-08-28) , 2016 .

[22]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[23]  Miguel Correia,et al.  Betweenness centrality in Delay Tolerant Networks: A survey , 2015, Ad Hoc Networks.

[24]  Iain Parris,et al.  Privacy-enhanced social-network routing , 2012, Comput. Commun..

[25]  Lorenzo Bracciale,et al.  CRAWDAD dataset roma/taxi (v.2014-07-17) , 2014 .

[26]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[27]  Carlos Borrego,et al.  PrivHab+: A secure geographic routing protocol for DTN , 2016, Comput. Commun..

[28]  Paulo Rogerio Pereira,et al.  Security in Delay-Tolerant Mobile Cyber-Physical Applications , 2015 .

[29]  Donald F. Towsley,et al.  Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.