Maintaining integrity and reputation in content offloading

The growing demand for mobile content has increased the burden on cellular network providers. To this end, mobile content offloading approaches aim to offer a relief of overloaded cellular network infrastructures via local content exchanges between mobile devices. A core assumption of proposed approaches is the voluntary, honest, and altruistic participation of devices or their owners. This dependency offers malicious participants an avenue of mounting denial-of-service attacks by lying about the content they have or by providing forged content, thereby negating the principal advantages of mobile offloading. Furthermore, without mutual authentication between the participants, there are no means of identification and thereby no chance to report or to stop abuse. In this paper, we thus propose MIRCO, an approach that adds integrity protection to the offloaded content, authentication for participants, and a commitment to the exchange of content between devices. We embed the aforementioned techniques into the offloading process and implement and evaluate our approach using Android smartphones with regard to time and energy overhead. Our results show that MIRCO only adds negligible overhead to content exchanges, thus enabling a feasible and accountable content offloading approach.

[1]  Sacha Trifunovic,et al.  PodNetSec : Secure Opportunistic Content Dissemination , 2010 .

[2]  Jan Rüth,et al.  Interest-based cloud-facilitated opportunistic networking , 2013, CHANTS '13.

[3]  Vijay Erramilli,et al.  Is there a case for mobile phone content pre-staging? , 2013, CoNEXT.

[4]  Donald Eastlake rd,et al.  Transport Layer Security (TLS) Extensions: Extension Definitions , 2011 .

[5]  Jörg Ott,et al.  Searching for content in mobile DTNs , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[6]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[7]  Roy T. Fielding,et al.  Uniform Resource Identifiers (URI): Generic Syntax , 1998, RFC.

[8]  Hanno Wirtz,et al.  Pervasive content-centric wireless networking , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[9]  Jason Flinn,et al.  Informed mobile prefetching , 2012, MobiSys '12.

[10]  Rich Salz,et al.  A Universally Unique IDentifier (UUID) URN Namespace , 2005, RFC.

[11]  Dominik Schatzmann,et al.  WiFi-Opp: ad-hoc-less opportunistic networking , 2011, CHANTS '11.

[12]  Roy T. Fielding,et al.  Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.

[13]  Aravind Srinivasan,et al.  Cellular traffic offloading through opportunistic communications: a case study , 2010, CHANTS '10.

[14]  Dan Pei,et al.  To Cache or Not to Cache: The 3G Case , 2011, IEEE Internet Computing.

[15]  Pan Hui,et al.  Multiple mobile data offloading through delay tolerant networks , 2011, CHANTS '11.

[16]  Antonino Masaracchia,et al.  Offloading through Opportunistic Networks with Dynamic Content Requests , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[17]  Marcelo Dias de Amorim,et al.  Flooding data in a cell: is cellular multicast better than device-to-device communications? , 2014, CHANTS '14.

[18]  Pan Hui,et al.  Haggle: A networking architecture designed around mobile users , 2006 .

[19]  Ellen W. Zegura,et al.  CoAST: collaborative application-aware scheduling of last-mile cellular traffic , 2014, MobiSys.

[20]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[21]  Romit Roy Choudhury,et al.  DataSpotting: Exploiting naturally clustered mobile devices to offload cellular traffic , 2013, 2013 Proceedings IEEE INFOCOM.

[22]  Feng Qian,et al.  Web caching on smartphones: ideal vs. reality , 2012, MobiSys '12.

[23]  Baochun Li,et al.  Maximized Cellular Traffic Offloading via Device-to-Device Content Sharing , 2016, IEEE Journal on Selected Areas in Communications.