Abstract
Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where a user interacts with other users present in near proximity in order to make social relationships between them. The users’ mobile devices directly communicate with each other with the help of Bluetooth/Wi-Fi interfaces. The possible presence of a malicious user in the near proximity poses significant threats to the privacy of legitimate users. Therefore, an efficient trust evaluation mechanism is necessary that enables a legitimate user to evaluate and decide about the trustworthiness of other user in order to make friendship. This paper proposes a protocol that evaluates various parameters in order to calculate a trust value that assists a PMSN user in decision making for building new social ties. This paper describes various components of trust such as friend of friend, credibility and the type of social spot where trust evaluation is being performed and then calculates these parameters in order to compute the final trust value. We utilize semi-trusted servers to authenticate users as well as to perform revocation of malicious users. In case of an attack on servers, real identities of users remain secure. We not only hide the real identity of the user from other users but also from the semi-trusted servers. The inherent mechanism of our trust evaluation protocol provides resilience against Sybil and Man-In-The-Middle (MITM) attacks. Towards the end of the paper, we present various attack scenarios to find the effectiveness and robustness of our trust evaluation protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Najaflou, Y., Jedari, B., Xia, F., Yang, L.T., Obaidat, M.S.: Safety challenges and solutions in mobile social networks. IEEE Syst. J. 99, 1–21 (2013)
Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: a survey. In: Proceedings of the IEEE, vol. 99, pp. 2130–2158 (2011)
Li, J., Zhang, Z., Zhang, W.: Mobitrust: trust management system in mobile social computing. In: IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 954–959 (2010)
Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47:1–47:33 (2013)
Qureshi, B., Min, G., Kouvatsos, D.: M-Trust: a trust management scheme for mobile P2P networks. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 476–483 (2010)
Goncalves, M., Dos Santos Moreira, E., Martimiano, L.: Trust management in opportunistic networks. In: IEEE 9th International Conference on Networks (ICN), pp. 209–214 (2010)
Huerta-Canepa, G., Lee, D., Han, S.Y.: Trust me: a trust decision framework for mobile environments. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 464–471 (2011)
Tahta, U.E., Sen, S., Can, A.B.: GenTrust: a genetic trust management model for peer-to-peer systems. Appl. Soft Comput. 34, 693–704 (2015)
Certicom Research: Sec 1: Elliptic Curve Cryptography. http://www.secg.org/sec1-v2.pdf
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: ACM International Conference on Management of Data (SIGMOD), pp. 86–97 (2003)
Abbas, F., Rajput, U., Hussain, R., Eun, H., Oh, H.: A trustless broker based protocol to discover friends in proximity-based mobile social networks. In: Rhee, K.-H., Yi, J.H. (eds.) WISA 2014. LNCS, vol. 8909, pp. 216–227. Springer, Heidelberg (2015)
Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 165–179. Springer, Heidelberg (1999)
Eagle, N., Pentland, A.: Social serendipity: mobilizing social software. IEEE Pervasive Comput. 4(2), 28–34 (2005)
Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: A two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643–650 (2015)
Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: IEEE 9th International Conference on Privacy, Security and Trust (PST), pp. 252–259 (2011)
Acknowledgment
This research was supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Centre) support program (IITP-2016-H8501-16-1007) and (IITP-2016-H8501-16-1018) supervised by the IITP (Institute for Information and communications Technology Promotion).
This work was also supported in part by the NRF (National Research Foundation of Korea) grant funded by the Korea government MEST (Ministry of Education, Science and Technology) (No. NRF-2015R1D1A1A09058200).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Abbas, F. et al. (2016). Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network. In: Nguyen, H., Snasel, V. (eds) Computational Social Networks. CSoNet 2016. Lecture Notes in Computer Science(), vol 9795. Springer, Cham. https://doi.org/10.1007/978-3-319-42345-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-42345-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42344-9
Online ISBN: 978-3-319-42345-6
eBook Packages: Computer ScienceComputer Science (R0)