Security-oriented opportunistic data forwarding in Mobile Social Networks

Abstract In recent years, Mobile Social Networks (MSNs) have been arising a growing interest in both scientific and industrial fields for its potential value. The effective data transmission of MSNs is generally achieved through opportunistic forwarding and node collaboration. However, malicious nodes may illegally intercept and drop the data packets which should be forwarded. Therefore, it is very challenging to detect these malicious nodes. In this paper, we proposed a new Resisting On–Off Attack Data Forwarding Mechanism (OADM) for MSNs to detect the on–off attack, which not only prevents malicious nodes from intercepting data packets, but also exploits the node collaboration to forward data packets. Our major contribution includes: (1) Exploiting Hidden Markov Model (HMM) model to learn node behaviors for the evaluation of attacking probabilities and node states; (2) Effective relay node selection based the estimation of node capability. Results show the proposed OADM can effectively identify the attacking behavior and collaborating states of nodes and significantly improve the data delivery rate of MSNs.

[1]  Peter I. Corke,et al.  Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI , 2013, Comput. Secur..

[2]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[3]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  G Murphy,et al.  Airborne spread of measles in a suburban elementary school. , 1978, American journal of epidemiology.

[5]  Alia I. Abdelmoty,et al.  Towards Location Privacy Awareness on Geo-Social Networks , 2016, 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).

[6]  Pan Hui,et al.  Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Stefano Chessa,et al.  Service discovery in mobile social networks , 2014, PIMRC.

[8]  Yu Wang,et al.  Energy efficient social routing framework for mobile social sensing networks , 2016 .

[9]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[10]  Said Agoujil,et al.  Stochastic modeling and analysis of DTN networks , 2016, 2016 International Conference on Information Technology for Organizations Development (IT4OD).

[11]  Aleksandr Ometov,et al.  A unifying perspective on proximity-based cellular-assisted mobile social networking , 2016, IEEE Communications Magazine.

[12]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[13]  Yuji Oie,et al.  Can Scheduling with Error Rate Consideration Support TCP Performance Comparable to Packet Combining HARQ in Evolved UTRA and UTRAN Networks? , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).

[14]  Yuan Li,et al.  Heterogeneous cloud radio access networks: a new perspective for enhancing spectral and energy efficiencies , 2014, IEEE Wireless Communications.

[15]  Yan Zhang,et al.  Satellite image adaptive restoration using periodic plus smooth image decomposition and complex wavelet packet transforms , 2012 .

[16]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[17]  P. Veeraraghavan,et al.  Trust in mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[18]  Carson Kai-Sang Leung,et al.  Big data mining of social networks for friend recommendation , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[19]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[20]  Keqiu Li,et al.  Secure friend discovery based on encounter history in mobile social networks , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.

[21]  Leonard Barolli,et al.  A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of Direct Delivery, Epidemic and Energy Aware Epidemic DTN Protocols , 2015, 2015 18th International Conference on Network-Based Information Systems.

[22]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[23]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[24]  Gianluca Dini,et al.  Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.

[25]  Honggang Wang,et al.  Node Service Ability Aware Packet Forwarding Mechanism in Intermittently Connected Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[26]  Jianwei Huang,et al.  Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty , 2009, 2010 Proceedings IEEE INFOCOM.

[27]  Jean C. Walrand,et al.  Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing , 2014, IEEE Transactions on Mobile Computing.

[28]  Jianhua Ma,et al.  Message Forwarding Strategies in Device-to-Device Based Mobile Social Networking in Proximity (MSNP) , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[29]  Bin Dai,et al.  Challenges and opportunities on network resource management in DCN with SDN , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[30]  Irinel-Constantin Morarescu,et al.  Continuous opinions and discrete actions in social networks: A multi-agent system approach , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[31]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[32]  Zufan Zhang,et al.  Energy efficiency based on joint mobile node grouping and data packet fragmentation in short-range communication system , 2014, Int. J. Commun. Syst..

[33]  Yanyan Wang,et al.  Dynamic Coding Control in Social Intermittent Connectivity Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[34]  Arun Venkataramani,et al.  Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.

[35]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[36]  Shiwen Mao,et al.  Joint duplex mode selection, channel allocation, and power control for full-duplex cognitive femtocell networks ☆ , 2015 .

[37]  Pengfei Li,et al.  A sybil attack detection scheme for privacy-preserving mobile social networks , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).

[38]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[39]  Abraham Martín-Campillo,et al.  Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios , 2012, Comput. Commun..

[40]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[41]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[42]  Daqing Zhang,et al.  EMC3: Energy-efficient data transfer in mobile crowdsensing under full coverage constraint , 2015, IEEE Transactions on Mobile Computing.

[43]  Jean-Yves Le Boudec,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010, IEEE Trans. Mob. Comput..

[44]  Wang Ru-yan Connection status aware cost efficient message transmission mechanism in opportunistic networks , 2013 .

[45]  Victor C. M. Leung,et al.  A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.

[46]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.