By Topic

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Xiaohui Liang ; Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada ; Xu Li ; Luan, T.H. ; Rongxing Lu
more authors

Effective data forwarding is critical for most mobile social network (MSN) applications such as content distribution and information searching. However, it could severely be interrupted or even disabled when the privacy preservation of users is applied, because users become unrecognizable to each other, and the social ties and interactions are no longer traceable to facilitate cooperative data forwarding. Therefore, how we can enable efficient user cooperation in MSNs without intruding on user privacy is a challenging issue. In this paper, we address this issue by introducing social morality, which is a fundamental social feature of human society, to MSNs and accordingly design a three-step protocol suite to achieve both privacy preservation and cooperative data forwarding. First, the developed protocol adopts a novel privacy-preserving route-based authentication scheme that notifies a user's anonymized mobility information to the public. Second, it measures the proximity of the user's mobility information to a specific packet's destination and evaluates the user's forwarding capacity for the packet. Third, using a game-theoretical approach, it determines the optimal data-forwarding strategy according to users' morality level and payoff. Using analysis and examples, we show that the developed protocol suite can effectively protect user personal information such as identity and visited locations. Last, we conduct extensive trace-based simulations and show that the proposed protocol suite is effective for efficiently exploring the user cooperation and attain near-optimal performance in data forwarding.

Published in:

Vehicular Technology, IEEE Transactions on  (Volume:61 ,  Issue: 7 )