Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Trust evaluation based friend recommendation in proximity based mobile social network

Authors
Abbas, FizzaRajput, UbaidullahEun, HasooHa, DongsooMoon, TaeseonJin, WenhuiBack, HyunjunJo, HonglaeBang, SulRyu, Seung-HoOh, Heekuck
Issue Date
Aug-2016
Publisher
Springer Verlag
Citation
Computational Social Networks 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings, pp 158 - 169
Pages
12
Indexed
SCIE
SCOPUS
Journal Title
Computational Social Networks 5th International Conference, CSoNet 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings
Start Page
158
End Page
169
URI
https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/15970
DOI
10.1007/978-3-319-42345-6_14
Abstract
Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where a user interacts with other users present in near proximity in order to make social relationships between them. The users’ mobile devices directly communicate with each other with the help of Bluetooth/Wi-Fi interfaces. The possible presence of a malicious user in the near proximity poses significant threats to the privacy of legitimate users. Therefore, an efficient trust evaluation mechanism is necessary that enables a legitimate user to evaluate and decide about the trustworthiness of other user in order to make friendship. This paper proposes a protocol that evaluates various parameters in order to calculate a trust value that assists a PMSN user in decision making for building new social ties. This paper describes various components of trust such as friend of friend, credibility and the type of social spot where trust evaluation is being performed and then calculates these parameters in order to compute the final trust value. We utilize semi-trusted servers to authenticate users as well as to perform revocation of malicious users. In case of an attack on servers, real identities of users remain secure. We not only hide the real identity of the user from other users but also from the semi-trusted servers. The inherent mechanism of our trust evaluation protocol provides resilience against Sybil and Man-In- The-Middle (MITM) attacks. Towards the end of the paper, we present various attack scenarios to find the effectiveness and robustness of our trust evaluation protocol. © Springer International Publishing Switzerland 2016.
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE