By Topic

SocialMesh: Can networks of meshed smartphones ensure public access to twitter during an attack?

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

We explore whether public data networks called SocialMesh - formed automatically from smartphone radio-routers and adapting to changing RF propagation and interference without relying on managed cellular infrastructure - can also be designed to overcome any and all countermeasures mounted by an attacker and reliably support social applications such as Twitter, Facebook, and Google. We rigorously examine the architecture, techniques and algorithms that make decentralized or "ad-hoc," ultrawideband networks work in the presence of hostile jamming or protocol attacks. We illustrate the RF link-budget using 3-d graphs to show how interference affects the network performance as these networks become heavily utilized or jammed. Using low-cost hardware, self-organizing routing software, and uncoordinated/distributed CDMA we show how they can retain adequate system capacity even under heavy load from users or interference from jammers. Open standardization and field trials of SocialMesh networks will further clarify SocialMesh security and performance by opening up the design specifications to international review. Open-source design specifications for SocialMesh will be updated at http://www.socialmesh.org.

Published in:

Communications Magazine, IEEE  (Volume:50 ,  Issue: 6 )