PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles

Recent advances in socially aware networks (SANs) have allowed its use in many domains, out of which the Social Internet of Vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecting users’ interest information. In this paper, we propose a privacy-preserving interest-based forwarding scheme (PRIF) for SIOV, which not only protects the interest information but also improves the forwarding performance. We propose a privacy-preserving authentication protocol to recognize communities among mobile nodes. During data routing and forwarding, a node can know others’ interests only if they are affiliated with the same community. Moreover, to improve forwarding performance, a new metric community energy is introduced to indicate vehicular social proximity. Community energy is generated when two nodes encounter one another and information is shared among them. PRIF considers this energy metric to select forwarders toward the destination node or the destination community. Security analysis indicates PRIF can protect nodes’ interest information. In addition, extensive simulations have been conducted to demonstrate that PRIF outperforms the existing algorithms, including the BEEINFO, Epidemic, and PRoPHET.

[1]  Feng Xia,et al.  BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking , 2015, IEEE Transactions on Vehicular Technology.

[2]  Longfei Wu,et al.  MobiFish: A lightweight anti-phishing scheme for mobile phones , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[3]  Jie Wu,et al.  LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[4]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[5]  Chin-Tser Huang,et al.  Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks , 2011, Comput. Commun..

[6]  Xiaojiang Du,et al.  Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.

[7]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[8]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[9]  Pan Hui,et al.  How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[10]  Victor C. M. Leung,et al.  S-Aframe: Agent-Based Multilayer Framework With Context-Aware Semantic Service for Vehicular Social Networks , 2015, IEEE Transactions on Emerging Topics in Computing.

[11]  Jörg Ott,et al.  Simulating Mobility and DTNs with the ONE (Invited Paper) , 2010, J. Commun..

[12]  Xiaojiang Du,et al.  Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[13]  Xiaojiang Du,et al.  A calculation method for social network user credibility , 2017, 2017 IEEE International Conference on Communications (ICC).

[14]  Chao Zhang,et al.  Routing with multi-level cross-community social groups in mobile opportunistic networks , 2013, Personal and Ubiquitous Computing.

[15]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[16]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[17]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[18]  Zhenyu He,et al.  Robust Object Tracking via Key Patch Sparse Representation , 2017, IEEE Transactions on Cybernetics.

[19]  Hongke Zhang,et al.  Energy-efficient cluster management in heterogeneous vehicular networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[20]  Zhenyu He,et al.  Connected Component Model for Multi-Object Tracking , 2016, IEEE Transactions on Image Processing.

[21]  Anna Maria Vegni,et al.  A Survey on Vehicular Social Networks , 2015, IEEE Communications Surveys & Tutorials.

[22]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[23]  Rongxing Lu,et al.  Vehicular Ad Hoc Network Security and Privacy , 2015 .

[24]  Wei Yuan,et al.  Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective , 2013, IEEE Transactions on Mobile Computing.

[25]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[26]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[27]  Boleslaw K. Szymanski,et al.  Friendship Based Routing in Delay Tolerant Mobile Social Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[28]  Yuan Yan Tang,et al.  Thinning Character Using Modulus Minima of Wavelet Transform , 2006, Int. J. Pattern Recognit. Artif. Intell..

[29]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[30]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[31]  Lionel Brunie,et al.  A delay and cost balancing protocol for message routing in mobile delay tolerant networks , 2015, Ad Hoc Networks.

[32]  Nick Filer,et al.  Neighbour discovery in opportunistic networks , 2015, Ad Hoc Networks.

[33]  Cecilia Mascolo,et al.  Writing on the clean slate: Implementing a socially-aware protocol in Haggle , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[34]  Cecilia Mascolo,et al.  Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[35]  Marco Conti,et al.  Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution , 2008, Pervasive Mob. Comput..

[36]  Yue Zhang,et al.  Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture , 2016, IEEE Wireless Communications.

[37]  Anelise Munaretto,et al.  GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization , 2012, Comput. Networks.

[38]  Hongke Zhang,et al.  Improving QoS on high-speed vehicle by multipath transmission based on practical experiment , 2015, 2015 IEEE Vehicular Networking Conference (VNC).