Author : Dr.S.Chakaravarthi 1
Date of Publication :18th August 2017
Abstract: The mobile communication are usually done by proximity based mobile opportunistic social network to communicate between the nodes. Usually the nodes are communicated with their real ID to the mobile opportunistic social network (MOSN).In current method, using FaceChange that can support both anonymizing real IDs among neighbour nodes and collecting real IDbased encountering information which also support the fine grained control over the information in encountering evidence. Only when the two nodes disconnect with each other, each node forwards an encrypted encountering evidence to the encountered node to enable encountering information collection. Here, we propose, Advanced extensions for sharing real IDs with the alias name or alias ID between mutually trusted nodes of trusted authority. The efficient encountering evidence collection are done by the exchanging encountering information between the nodes after communication are done. This exchange of information by encountering evidence shows the trustworthiness and validate the use by having the time, real ID, alias name which are in the encrypted form of cipher text with some advanced encryption algorithm and with signatures. The signature with the real ID based play the role for decryption which says about the trustworthiness and validate the user. This helps to verify the trustworthiness of the mutually trusted node of trusted authority and validity of the user nodes from malicious nodes
Reference :
-
- S. Jain, K. Fall, and R. Patra, ―Routing in a delay tolerant network,‖ in Proc. SIGCOMM, 2004, pp. 145– 158.
- J. Wu, M. Xiao, and L. Huang, ―Homing spread: Community home-based multi-copy routing in mobile social networks,‖ in Proc. IEEE INFOCOM, Apr. 2013, pp. 2319–2327.
- T. Ning, Z. Yang, H. Wu, and Z. Han, ―Self-interestdriven incentives for ad dissemination in autonomous mobile social networks,‖ in Proc. IEEE INFOCOM, Apr. 2013, pp. 2310–2318.
- A. Balasubramanian, B. Levine, and A. Venkataramani, ―DTN routing as a resource allocation problem,‖ in Proc. SIGCOMM, 2007, pp. 373–384.
- P. Hui, E. Yoneki, S. Y. Chan, and J. Crowcroft, ―Distributed community detection in delay tolerant networks,‖ in Proc. MobiArch, 2007, Art. no. 7,