WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET

A number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. Further their location-based services are not offered to low-end mobile devices without GPS modules. To build a system that can take advantage of cloud, and also can address these potential problems that could hinder OSN usage, we design and construct a multi-hop networking system named MoNet based on WiFi, and on top of which we design and implement WiFace, a privacy-aware geosocial networking service. For the situation without any infrastructure, we design a distributed content sharing protocol which can significantly shorten the relay path, reduce conflicts and improve data persistence and availability. A role strategy is designed to encourage users to collaborate in the network. Furthermore, a key management and an authorization mechanism are developed to prevent some attacks and protect privacy. We conduct comprehensive experiments to evaluate the performance of our mobile platform MoNet and application WiFace. The results show that MoNet is more than sufficient to support social networking, and even audio and video applications.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[3]  Thomas C. Schelling,et al.  Dynamic models of segregation , 1971 .

[4]  Vincenzo Mancuso,et al.  Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  Adi Shamir,et al.  How to expose an eavesdropper , 1984, CACM.

[6]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[7]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[8]  Roger Dingledine,et al.  The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[9]  Robert Tappan Morris,et al.  Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.

[10]  N. Beijar,et al.  Understanding Attitudes Towards Mobile Peer-to-Peer Content Sharing Services , 2007, 2007 IEEE International Conference on Portable Information Devices.

[11]  Mario Gerla,et al.  BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[12]  Jitendra Padhye,et al.  Comparison of routing metrics for static multi-hop wireless networks , 2004, SIGCOMM '04.

[13]  Robert Tappan Morris,et al.  Architecture and evaluation of an unplanned 802.11b mesh network , 2005, MobiCom '05.

[14]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[15]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[16]  Mario Gerla,et al.  BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Robert Ricci,et al.  Mobile Emulab: A Robotic Wireless and Sensor Network Testbed , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[19]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[20]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[21]  Thierry Turletti,et al.  BitHoc: A content sharing application for wireless ad hoc networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[22]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[23]  Xiang-Yang Li Multicast Capacity of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.

[24]  T. Schelling Models of Segregation , 1969 .