移动社交网络中的可扩展和隐私保护路由

Cong Liu, Mingjun Xiao, Yaxiong Zhao
{"title":"移动社交网络中的可扩展和隐私保护路由","authors":"Cong Liu, Mingjun Xiao, Yaxiong Zhao","doi":"10.1109/MASS.2018.00087","DOIUrl":null,"url":null,"abstract":"Mobility-assisted opportunistic routing in mobile social network is an interesting research topic with real world applications. It allows users to exchange large chunks of data without relying on stationary network infrastructures. This paper proposes a scalability and privacy preserving routing algorithm. The core of a multi-hop routing scheme is the prediction of the next relay router, which ideally is the next hop on the shortest path to the destination of the message. The proposed routing algorithm contains a machine learning based prediction model that is trained on a trace of nodes connection events collected during a warm up period in a network where the mobility is assumed to exhibit a certain degree of regularity as in general human social networks. The algorithm is scalable since the prediction model, i.e. the control plane of the algorithm, only needs to maintain and broadcast the trained model that implicitly encodes the possible mobility locations and patterns within the mobility area, which is a constant to the number of nodes in the network. The algorithm is privacy preserving because that it does not require the nodes to disclose to other nodes any explicit information about its previous mobility or its personal preferences. Privacy preserving is achieved by using distributed node representations that jointly encode the mobility pattern of the node together with the prediction model, instead of using explicit statistical information to represent previous connectivity patterns as in prior work. This on one hand make attacker hard to find out any exact information about any particular node, and on the other hand enables the routing algorithm to extrapolate to the prediction of nodes of unseen mobility pattern, which is difficult if hand designed statistical mobility information is used. To perform large scale experiments, we collect very large synthetic mobility trace from university course registration information, this trace contain a total of about 35,000 nodes and 300 million message forwarding links. Experiments are conduct to examine several prediction accuracies of our algorithm.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"32 22","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Scalable and Privacy Preserving Routing in Mobile Social Networks\",\"authors\":\"Cong Liu, Mingjun Xiao, Yaxiong Zhao\",\"doi\":\"10.1109/MASS.2018.00087\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobility-assisted opportunistic routing in mobile social network is an interesting research topic with real world applications. It allows users to exchange large chunks of data without relying on stationary network infrastructures. This paper proposes a scalability and privacy preserving routing algorithm. The core of a multi-hop routing scheme is the prediction of the next relay router, which ideally is the next hop on the shortest path to the destination of the message. The proposed routing algorithm contains a machine learning based prediction model that is trained on a trace of nodes connection events collected during a warm up period in a network where the mobility is assumed to exhibit a certain degree of regularity as in general human social networks. The algorithm is scalable since the prediction model, i.e. the control plane of the algorithm, only needs to maintain and broadcast the trained model that implicitly encodes the possible mobility locations and patterns within the mobility area, which is a constant to the number of nodes in the network. The algorithm is privacy preserving because that it does not require the nodes to disclose to other nodes any explicit information about its previous mobility or its personal preferences. Privacy preserving is achieved by using distributed node representations that jointly encode the mobility pattern of the node together with the prediction model, instead of using explicit statistical information to represent previous connectivity patterns as in prior work. This on one hand make attacker hard to find out any exact information about any particular node, and on the other hand enables the routing algorithm to extrapolate to the prediction of nodes of unseen mobility pattern, which is difficult if hand designed statistical mobility information is used. To perform large scale experiments, we collect very large synthetic mobility trace from university course registration information, this trace contain a total of about 35,000 nodes and 300 million message forwarding links. Experiments are conduct to examine several prediction accuracies of our algorithm.\",\"PeriodicalId\":146214,\"journal\":{\"name\":\"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)\",\"volume\":\"32 22\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MASS.2018.00087\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MASS.2018.00087","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

移动社交网络中的机动性辅助机会路由是一个具有实际应用价值的有趣研究课题。它允许用户在不依赖固定网络基础设施的情况下交换大块数据。本文提出了一种可扩展性和保密性的路由算法。多跳路由方案的核心是对下一个中继路由器的预测,理想情况下,下一个中继路由器是到达消息目的地最短路径上的下一跳。所提出的路由算法包含一个基于机器学习的预测模型,该模型是在网络预热期间收集的节点连接事件的跟踪上进行训练的,其中假定移动性表现出一定程度的规律性,就像一般的人类社交网络一样。该算法具有可扩展性,因为预测模型即算法的控制平面只需要维护和传播训练好的模型,该模型隐式地编码了移动区域内可能的移动位置和模式,该移动区域与网络中的节点数量成常数。该算法是隐私保护的,因为它不要求节点向其他节点披露任何关于其先前移动或个人偏好的明确信息。隐私保护是通过使用分布式节点表示来实现的,分布式节点表示将节点的移动模式与预测模型一起编码,而不是像以前的工作那样使用显式的统计信息来表示以前的连接模式。这一方面使得攻击者很难找到任何特定节点的准确信息,另一方面使得路由算法可以外推到不可见移动模式的节点的预测,这在使用手工设计的统计移动信息时是很困难的。为了进行大规模的实验,我们从大学课程注册信息中收集了非常大的合成移动轨迹,该轨迹总共包含约35,000个节点和3亿个消息转发链路。通过实验验证了该算法的几种预测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Scalable and Privacy Preserving Routing in Mobile Social Networks
Mobility-assisted opportunistic routing in mobile social network is an interesting research topic with real world applications. It allows users to exchange large chunks of data without relying on stationary network infrastructures. This paper proposes a scalability and privacy preserving routing algorithm. The core of a multi-hop routing scheme is the prediction of the next relay router, which ideally is the next hop on the shortest path to the destination of the message. The proposed routing algorithm contains a machine learning based prediction model that is trained on a trace of nodes connection events collected during a warm up period in a network where the mobility is assumed to exhibit a certain degree of regularity as in general human social networks. The algorithm is scalable since the prediction model, i.e. the control plane of the algorithm, only needs to maintain and broadcast the trained model that implicitly encodes the possible mobility locations and patterns within the mobility area, which is a constant to the number of nodes in the network. The algorithm is privacy preserving because that it does not require the nodes to disclose to other nodes any explicit information about its previous mobility or its personal preferences. Privacy preserving is achieved by using distributed node representations that jointly encode the mobility pattern of the node together with the prediction model, instead of using explicit statistical information to represent previous connectivity patterns as in prior work. This on one hand make attacker hard to find out any exact information about any particular node, and on the other hand enables the routing algorithm to extrapolate to the prediction of nodes of unseen mobility pattern, which is difficult if hand designed statistical mobility information is used. To perform large scale experiments, we collect very large synthetic mobility trace from university course registration information, this trace contain a total of about 35,000 nodes and 300 million message forwarding links. Experiments are conduct to examine several prediction accuracies of our algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Deep Learning Based Urban Post-Accidental Congestion Prediction BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds A Fusion Method of Multiple Sensors Data on Panorama Video for Airport Surface Surveillance Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1