Skip to main content

Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network

  • Conference paper
  • First Online:
Computational Social Networks (CSoNet 2016)

Abstract

Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where a user interacts with other users present in near proximity in order to make social relationships between them. The users’ mobile devices directly communicate with each other with the help of Bluetooth/Wi-Fi interfaces. The possible presence of a malicious user in the near proximity poses significant threats to the privacy of legitimate users. Therefore, an efficient trust evaluation mechanism is necessary that enables a legitimate user to evaluate and decide about the trustworthiness of other user in order to make friendship. This paper proposes a protocol that evaluates various parameters in order to calculate a trust value that assists a PMSN user in decision making for building new social ties. This paper describes various components of trust such as friend of friend, credibility and the type of social spot where trust evaluation is being performed and then calculates these parameters in order to compute the final trust value. We utilize semi-trusted servers to authenticate users as well as to perform revocation of malicious users. In case of an attack on servers, real identities of users remain secure. We not only hide the real identity of the user from other users but also from the semi-trusted servers. The inherent mechanism of our trust evaluation protocol provides resilience against Sybil and Man-In-The-Middle (MITM) attacks. Towards the end of the paper, we present various attack scenarios to find the effectiveness and robustness of our trust evaluation protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Najaflou, Y., Jedari, B., Xia, F., Yang, L.T., Obaidat, M.S.: Safety challenges and solutions in mobile social networks. IEEE Syst. J. 99, 1–21 (2013)

    Google Scholar 

  2. Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: a survey. In: Proceedings of the IEEE, vol. 99, pp. 2130–2158 (2011)

    Google Scholar 

  3. Li, J., Zhang, Z., Zhang, W.: Mobitrust: trust management system in mobile social computing. In: IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 954–959 (2010)

    Google Scholar 

  4. Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47:1–47:33 (2013)

    Article  Google Scholar 

  5. Qureshi, B., Min, G., Kouvatsos, D.: M-Trust: a trust management scheme for mobile P2P networks. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 476–483 (2010)

    Google Scholar 

  6. Goncalves, M., Dos Santos Moreira, E., Martimiano, L.: Trust management in opportunistic networks. In: IEEE 9th International Conference on Networks (ICN), pp. 209–214 (2010)

    Google Scholar 

  7. Huerta-Canepa, G., Lee, D., Han, S.Y.: Trust me: a trust decision framework for mobile environments. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 464–471 (2011)

    Google Scholar 

  8. Tahta, U.E., Sen, S., Can, A.B.: GenTrust: a genetic trust management model for peer-to-peer systems. Appl. Soft Comput. 34, 693–704 (2015)

    Article  Google Scholar 

  9. Certicom Research: Sec 1: Elliptic Curve Cryptography. http://www.secg.org/sec1-v2.pdf

  10. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: ACM International Conference on Management of Data (SIGMOD), pp. 86–97 (2003)

    Google Scholar 

  11. Abbas, F., Rajput, U., Hussain, R., Eun, H., Oh, H.: A trustless broker based protocol to discover friends in proximity-based mobile social networks. In: Rhee, K.-H., Yi, J.H. (eds.) WISA 2014. LNCS, vol. 8909, pp. 216–227. Springer, Heidelberg (2015)

    Google Scholar 

  12. Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 165–179. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  13. Eagle, N., Pentland, A.: Social serendipity: mobilizing social software. IEEE Pervasive Comput. 4(2), 28–34 (2005)

    Article  Google Scholar 

  14. Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: A two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643–650 (2015)

    Google Scholar 

  15. Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: IEEE 9th International Conference on Privacy, Security and Trust (PST), pp. 252–259 (2011)

    Google Scholar 

Download references

Acknowledgment

This research was supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Centre) support program (IITP-2016-H8501-16-1007) and (IITP-2016-H8501-16-1018) supervised by the IITP (Institute for Information and communications Technology Promotion).

This work was also supported in part by the NRF (National Research Foundation of Korea) grant funded by the Korea government MEST (Ministry of Education, Science and Technology) (No. NRF-2015R1D1A1A09058200).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heekuck Oh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Abbas, F. et al. (2016). Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network. In: Nguyen, H., Snasel, V. (eds) Computational Social Networks. CSoNet 2016. Lecture Notes in Computer Science(), vol 9795. Springer, Cham. https://doi.org/10.1007/978-3-319-42345-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42345-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42344-9

  • Online ISBN: 978-3-319-42345-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics