PodNetSec: Secure Opportunistic Content Dissemination

نویسندگان

  • Sacha Trifunovic
  • Bernhard Distl
  • Franck Legendre
  • Carlos Anastasiades
چکیده

PodNet: PodNet [1] (Fig. 1(a)) targets mobile content distribution by extending the traditional podcasting concept to opportunistic peer-to-peer content delivery among users via IEEE 802.11 wireless communications in ad hoc mode. Content is organized as episodes in channels, which users can subscribe to and download content once a peer within range holds new episodes. Information thus spreads from user to user in an epidemic fashion making use of mobility. In the initial version of PodNet, content publication was done anonymously, making it an ideal platform for spreading spam and illegal content. With PodNetSec three channel types are introduced, namely open, restricted, and closed. Closed channels allow private and encrypted dissemination of content in a limited group e.g., for friends to share photos. Restricted channels only allow authorized users to publish content but everybody to consume it, thus basically supporting official podcasters (e.g., BBC). Open channels allow every user to consume as well as create new content. Although useful for applications such as discussion forums, or video sharing (e.g., YouTube), it may serve as an easy platform to spread spam and objectionable content. AntiSpam control mechanisms are thus required. PodNetSec Integrated Security Framework: PodNetSec implements mechanisms – leveraging realworld social networks and communities – to prevent the dissemination of spam and illegal content in open channels. A two-level rating system as well as social trust metrics based on friend ties and local communities, are introduced and serve as input of a reactive as well as a proactive spam control mechanism. We introduce the notion of a user through self-created credentials (public/private key) [2]. These guarantee the inimitability of an identity and provide authentication of already known users, non-repudiation, and integrity without the support of a central authority (CA). As these cannot prevent users from generating multiple identities and launching Sybil attacks [3], we minimize their effect by establishing trust in genuine identities. This is based on their social ties demonstrated by a secure pairing process [4] or on their familiarity and similarity (community) in the underlying mobility graph [5]. A two level rating system is introduced to allow for content to be rated and author’s to build up a reputation (based on teir publications). It allows to rate, first, the legitimacy and, second, the quality of the content.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of cognitive heuristics for content dissemination in opportunistic networks

When faced with large amounts of data, human brains are able to swiftly react to stimuli and assert relevance of discovered information, even under uncertainty and partial knowledge. These efficient decision-making abilities rely on socalled cognitive heuristics, which are rapid, adaptive, lightweight yet very effective schemes used by the brain to solve complex problems. In a content-centric f...

متن کامل

Content Dissemination in Mobile Social Networks

Mobile social networking(MSN) has emerged as an effective platform for social network users to pervasively disseminate the contents such as news, tips, book information, music, video and so on. In content dissemination, mobile social network users receive content or information from their friends, acquaintances or neighbors, and selectively forward the content or information to others. The cont...

متن کامل

A Publish/Subscribe Model for Secure Content Driven XML Dissemination

Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector, healthcare or engineering. Specifically, providing a distributed XML content dissemination services in a selective and secure fashion is a challenging task. This paper proposes a publish/subscribe infrastructure to disseminate enterprise XML content utilizing document semantics. Our approach...

متن کامل

Content-Driven Secure and Selective XML Dissemination

Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector, healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper proposes a publish/subscribe infrastructure to disseminate enterprise XML content utilizing document semantics. Our approach reli...

متن کامل

Distance-Based Opportunistic Mobile Data Offloading

Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010