Abstract
Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We proposed a security mechanism to detect Sybil nodes and eliminate them to ensure the routing security while routing forwarding. It needs to cooperate by two sides, which is, respectively measuring distance in client side and eliminating Sybil nodes in server side. We also demonstrate the solution is correct and analyze its energy costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Online social network, http://en.wikipedia.org/wiki/Social_networking_service
Mobile social network, http://en.wikipedia.org/wiki/Mobile_social_network
Vastardis, N., Yang, K.: Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges. IEEE Communications Surveys & Tutorials 15(3), 1255–1371 (2012)
Nazir, F., Ma, J., Seneviratne, A.: Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks. In: Proc. of International Conference on Computational Science and Engineering, pp. 1066–1073 (2009)
Kawarabayashi, K., Nazir, F., Prendinger, H.: Message duplication reduction in dense mobile social networks. In: Proc of the 19th International Conference on Computer Communications and Networks, pp. 1–6 (2010)
Bulut, E., Szymanski, B.K.: Friendship based routing in delay tolerant mobile social networks. In: Proc. of IEEE Conference on Communications Society, pp. 1–5 (2010)
Bulut, E., Szymanski, B.K.: Exploiting Friendship relations for efficient routing in mobile social networks. IEEE Trans. on Parallel and Distributed Systems 23(12), 2254–2265 (2012)
Khosravi, A.: Pan Jian-ping. Exploring personal interest in intermittently connected wireless mobile social networks. In: Proc. of IEEE Consumer Communications and Networking Conference, pp. 3–508 (2011)
Kayastha, N., Niyato, D.: Applications, architectures, and protocol desigin issues for mobile social networks: a survery. Proceedings of the IEEE 99(12), 2130–2158 (2011)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: IPSN 2004, April 26-27, pp. 259–268. ACM Press, Berkeley (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Sun, Y., Yin, L. (2014). A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-11119-3_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11118-6
Online ISBN: 978-3-319-11119-3
eBook Packages: Computer ScienceComputer Science (R0)