mobile social networks: architecture, privacy, security issues … · 2017-09-28 · social...

8
Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions Vimitha R Vidhya Lakshmi and Gireesh Kumar T TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore Amrita Vishwa Vidyapeetham, Amrita University, India Email: [email protected]; [email protected] Abstract Mobile social networks are applications or platforms that allow mobile users to communicate or interact with each other. Statistical surveys show that almost 80% of people are involved in such kind of networking. This paper gives an overview of recent related works contributed in Mobile social networks. Earlier sections of this paper deals with basic details of Mobile social networks regarding: types, characteristics, applications and usage. Following sections are comprised of details on architecture and architectural components of Mobile social networks, privacy and security issues, challenges and some existing solutions. At the end, some proposed privacy and security solutions and future directions are discussed and suggested on Mobile social networking. Index TermsSocial networks, Mobile social networks, architecture, security, privacy I. INTRODUCTION Communication has become the basic need for all human beings. People communicate or interact with each other for everything and for all necessities of life. Moreover, communication does not end with people within small or limited ranges. The growth of technology made long distance communication much easier now-a- days. In this modern world, people even interact or communicate with strangers who are miles and miles apart. Networking is the basic technology behind this which made it possible. Such kind of networking is called social networking. Social networks are network dais where a group of users communicate and interact with each other by exchanging information, media or any other data to maintain social relationship among each other. When the user of social networks involve in mobility by using mobile devices such as smart phones, tablets, etc. for social communication, then such kind of networks are called Mobile Social Networks (MSN). Facebook, Instagram, Google+, Twitter are some of the examples of social networking sites (SNS). Mobile applications for these SNS were later developed due to the growth of mobile devices and such applications are examples of mobile social networks. There are two types of social networking: web based social networking and mobile social networking. Earlier Manuscript received June 20, 2017; revised September 22, 2017. doi:10.12720/jcm.12.9.524-531 in the desktop world, social networking was purely web based and with the development of mobile devices, especially smart phones mobile social networking took the place. Mobile social networking is possible with or without Internet. The social communication without Internet happens with the help of technologies like Bluetooth, Near Field Communication (NFC) or any other similar technologies. There are many specialties for mobile social networking [1]. MSN makes user access possible anytime and from anywhere. The entanglement of contextual information with the mobile device makes MSN special and different from traditional web based social networks. This is the main and important feature or characteristic of MSN. Mobile contextual information includes information regarding the position of the mobile device of the user and the user's friends, media capturing and tagging, advertisements, including proximity marketing, updated personal status and all other information about the services that can be provided by mobile technologies [2]. People use MSN for finding new friends, getting reviews about products and their purchase, sharing offers and discounts, sharing location and medias, discussing research works and ideas, exchanging information about institutions and organizations, e-learning [3], [4], etc. Thus MSN finds application in almost many fields and areas like academic, education, profession, medical, business, marketing, entertainment and so on. Like many advantages, there are also many disadvantages. The negative concerns about MSN involve decrease in human productivity, new and attractive platform for abuse, information spreading and leakage and many other security issues. This paper is about MSN, their architectures, privacy and security issues, existing solutions and some proposed privacy and security solutions. The organization of this paper is as follows: Section II discusses about different kinds of architecture of MSN, section III about architectural components, section IV about privacy and security issues and their existing as well as proposed solutions, and section V concludes the paper. II. ARCHITECTURE OF MSN The network layout of MSN [5] can be differentiated into four types: Centralized, De-centralized, Distributed 524 ©2017 Journal of Communications Journal of Communications Vol. 12, No. 9, September 2017

Upload: others

Post on 11-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

Mobile Social Networks: Architecture, Privacy, Security

Issues and Solutions

Vimitha R Vidhya Lakshmi and Gireesh Kumar T

TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore

Amrita Vishwa Vidyapeetham, Amrita University, India

Email: [email protected]; [email protected]

Abstract—Mobile social networks are applications or platforms

that allow mobile users to communicate or interact with each

other. Statistical surveys show that almost 80% of people are

involved in such kind of networking. This paper gives an

overview of recent related works contributed in Mobile social

networks. Earlier sections of this paper deals with basic details

of Mobile social networks regarding: types, characteristics,

applications and usage. Following sections are comprised of

details on architecture and architectural components of Mobile

social networks, privacy and security issues, challenges and

some existing solutions. At the end, some proposed privacy and

security solutions and future directions are discussed and

suggested on Mobile social networking.

Index Terms—Social networks, Mobile social networks,

architecture, security, privacy

I. INTRODUCTION

Communication has become the basic need for all

human beings. People communicate or interact with each

other for everything and for all necessities of life.

Moreover, communication does not end with people

within small or limited ranges. The growth of technology

made long distance communication much easier now-a-

days. In this modern world, people even interact or

communicate with strangers who are miles and miles

apart. Networking is the basic technology behind this

which made it possible. Such kind of networking is called

social networking.

Social networks are network dais where a group of

users communicate and interact with each other by

exchanging information, media or any other data to

maintain social relationship among each other. When the

user of social networks involve in mobility by using

mobile devices such as smart phones, tablets, etc. for

social communication, then such kind of networks are

called Mobile Social Networks (MSN). Facebook,

Instagram, Google+, Twitter are some of the examples of

social networking sites (SNS). Mobile applications for

these SNS were later developed due to the growth of

mobile devices and such applications are examples of

mobile social networks.

There are two types of social networking: web based

social networking and mobile social networking. Earlier

Manuscript received June 20, 2017; revised September 22, 2017.

doi:10.12720/jcm.12.9.524-531

in the desktop world, social networking was purely web

based and with the development of mobile devices,

especially smart phones mobile social networking took

the place. Mobile social networking is possible with or

without Internet. The social communication without

Internet happens with the help of technologies like

Bluetooth, Near Field Communication (NFC) or any

other similar technologies.

There are many specialties for mobile social

networking [1]. MSN makes user access possible anytime

and from anywhere. The entanglement of contextual

information with the mobile device makes MSN special

and different from traditional web based social networks.

This is the main and important feature or characteristic of

MSN. Mobile contextual information includes

information regarding the position of the mobile device

of the user and the user's friends, media capturing and

tagging, advertisements, including proximity marketing,

updated personal status and all other information about

the services that can be provided by mobile technologies

[2].

People use MSN for finding new friends, getting

reviews about products and their purchase, sharing offers

and discounts, sharing location and medias, discussing

research works and ideas, exchanging information about

institutions and organizations, e-learning [3], [4], etc.

Thus MSN finds application in almost many fields and

areas like academic, education, profession, medical,

business, marketing, entertainment and so on. Like many

advantages, there are also many disadvantages. The

negative concerns about MSN involve decrease in human

productivity, new and attractive platform for abuse,

information spreading and leakage and many other

security issues.

This paper is about MSN, their architectures, privacy

and security issues, existing solutions and some proposed

privacy and security solutions. The organization of this

paper is as follows: Section II discusses about different

kinds of architecture of MSN, section III about

architectural components, section IV about privacy and

security issues and their existing as well as proposed

solutions, and section V concludes the paper.

II. ARCHITECTURE OF MSN

The network layout of MSN [5] can be differentiated

into four types: Centralized, De-centralized, Distributed

524©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 2: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

and Hybrid. This differentiation is due to the

communication pattern of the users in the mobile social

networking. The communication pattern occurs between

users and centralized server, users and local server or

users and users. In some architecture, combination of the

above mentioned patterns are also seen, as in case of

hybrid architecture.

A. Centralized MSN

This layout is much like client-server architecture

where users act as client and service providers act as

centralized server. Here communication is between users

and centralized server and communication takes place

through Internet. Services like WiFi or cellular networks

are used to send and receive data and other information.

Such kind of architecture can be seen in applications like

Facebook, Twitter, Google+, etc. All these applications

have a centralized service provider called centralized

server which stores all the information of the user, mobile

device and data. Almost all the web-based MSN type of

applications/sites follows this type of layout structure. Fig.

1 shows the layout of centralized MSN.

Fig. 1. Centralized MSN

B. De-centralized MSN

Fig. 2. (a) De-Centralized MSN (top) (b) Distributed MSN (bottom)

In this architectural layout local servers are used to

store, update and send information like media, mobile

device details, the user's data and other related

information. Here communication is between users and

local server and communication takes place through the

intranet. People inside any institution/organization use

available intranet services to access details from their

local servers. Here third party applications like any

service providers or any centralized servers are not

involved in the communication. The diagrammatic view

of de-centralized MSN is shown in Fig. 2(a).

C. Distributed MSN

This is a client-client architecture where

communication is only between MSN users. In this type,

users communicate with each other with the help of

technologies like bluetooth, NFC or any other short range

communication technique. This type of communication

layout is seen in opportunistic network, ad-hoc network

or delay tolerant network. Proximity marketing [6] is an

example in which this kind of structural layout is seen.

Here no servers are used in between communications.

This structural view is seen in Fig. 2(b).

D. Hybrid MSN

This layout is a combination of both centralized and

distributed MSNs. Here communication can occur

between user and centralized servers (client-server) as

well as between users (client-client). This kind of layout

is shown in Fig. 3. Almost all new generation mobile

devices support hybrid architecture. For example, all

modern smart devices can access applications like

Facebook, Twitter, etc. that involve third party service

providers and also have access for social applications that

need Bluetooth or any other similar technology.

Fig. 3. Hybrid MSN

III. ARCHITECTURAL COMPONENTS OF MSN

Mobile device, Server and network structure are the

three main components [7] in the architecture of MSN.

525©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 3: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

Mobile device: They are the handheld devices such as

mobile phones, tablets or any smart device used by the

users in the network for interacting with each other. This

component is seen in all the layout structures of MSN.

Server: All the communication information and details

are located on servers (centralized or local servers) from

which mobile users retrieve the necessary data. Other

than distributed, all the structural layout has this

component. The local servers sometimes act as a bridge

or relay between mobile users and the centralized servers.

Network Structure: Communication happens between

the above two components depending on a network

structure. Thus the network structure acts as a

fundamental foundation for mobile device and servers to

communicate and also decides the communication pattern

of the network. Here communication can happen with the

help of the Internet (WiFi or cellular network) through

servers or without Internet using any short range

communication technique. Sometimes a combination of

the above two communication pattern is also seen as in

the case of hybrid MSN. All modern smart devices follow

this network structure.

IV. PROBLEM FORMULATION FOR PRIVACY AND

SECURITY IN MSN

As said earlier people not only communicate with their

near and dear ones but also to strangers. There are lots of

strangers out there across the Internet. Consequences of

communicating with strangers will have great negative

impact on users, creating privacy and security issues. Not

all, but most of the strangers are not trustworthy. The

information shared with these strangers has zero

possibility to be kept secure.

The user’s information can be collected by these

strangers even, without the knowledge of users and

sometimes in tricky ways. The depth of danger caused

depends upon the seriousness and importance of the

information shared. Apart from security issues there will

be privacy concerns also due to the spreading and leakage

of information shared. Even-though if the mobile users

maintain distance from strangers and stay away, these

issues can only be reduced but cannot be blocked

completely.

There are most dangerous people out there called

hackers. If strangers are known enemies, the hackers are

unknown enemies of the cyber world. Unknown enemies

are riskier than known enemies. These hackers are very

dangerous that they misuse and even sell user's details. So,

these are the possible ways by which user's information

gets opened to security and privacy issues in general as

well as in the MSN. Thus, privacy and security concerns

in MSNs are the demanding and most important research

field that needs day to day updates and solutions.

A. Security and Privacy Requirements

There are several privacy and security requirements in

MSN, of them the basic security requirements are

Integrity, Confidentiality, Availability and Authenticity

[8]. Other requirements include access control, non-

repudiation, anonymity, unlinkability and auditing [9].

Integrity of data: This ensures the consistency and

accuracy of data exchanged, processed and stored on

MSN. The necessity of this requirement is to protect data

from tampering by all means.

Confidentiality of data: This is about protecting the

data that is flowing between the components (users and

servers) of MSN. The data should be protected from

unauthorized persons and untrusted entities.

Data availability: To make sure the data is available

throughout the MSN at anytime and at anywhere. The

attacks like jamming attacks and denial of service attacks

should not restrict the availability of data in MSN.

Authenticity of data: The components like users and

servers involved in MSN should be valid and

authenticated. This requirement takes care of invalid

information and the invalid user.

The basic privacy requirement ensures that any privacy

sensitive or valuable information in MSN should be

protected from disclosing to illegal or untrusted entities in

the network. These information/details may include user's

details, device data, identity, location or any other data

regarding user or the device which the user is using. All

these information should be prevented from spreading

and leaking. Other than these requirements, MSNs are

prone to security hazards like tampering of data, Sybil

attacks, user's identity forgery and spam generation and

spreading.

B. Security and Privacy Issues or Challenges

Some of the major privacy and security issues in

MSNs are given below:

Direct anonymity issue: The attackers try to find out

the user's identity and other information/details by

hacking the shared social network ID of the user. This

problem can be seen in both user-server domain and user-

user domain. By getting any single information of the

user the other related information of the user can be

easily cracked by the attackers.

Indirect or K- anonymity issue: Here the attackers try

to find out or map user's identity by hacking any N

number of information about the user which uniquely

maps the user. This problem can also be seen in both

user-server and user-user domains. The solution to this

issue depends on creating an algorithm that uses a

minimal set, which contains a set of information about

the user that cannot directly map to the user, instead it

maps to K or fewer number of users. By doing so, the

attackers can be pushed to the stage of confusion in

finding out the identity of the original user.

Other attacks: There are many other attacks like

eavesdropping, spoofing, replay and wormhole attacks

that are related with the shared network ID of the user.

These attacks are mainly seen in user-user domain

because user-server domains are protected by HTTPS

protocol, which is much safer for these kinds of attacks.

526©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 4: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

Therefore user-user domain MSNs should be protected

from these kinds of attacks.

Trust Relations: Finding a trusted entity is one of the

most important challenges in MSN. For safe social

communication, users should maintain trust relation with

other entities like users and service providers.

Malicious attackers: These attackers may forge user's

identity, profile information and also generate fake details

about the user. They depreciate network resources and

sometimes tamper the data produced by the original users.

These attackers thus result in creating threats like forgery

and tampering which are the two main issues to be solved

in MSN. An efficient way of finding out these malicious

attackers still remains as an open problem in MSN.

Spam Detection: Any unwanted message or content

for a user in MSN is known as spam. This content may be

regarding advertisements, news, offers, sales, or any

message which is found out to be a useless content for a

user. Spam can be seen in E-mails, websites or SMS/text

message. In smart phone spam may result in drainage of

battery power and decrease in storage space. Therefore a

perfect and accurate spam filtering system is required to

stop this spam data transfer in MSNs.

Sybil attacks (SA): Here the user's identity is

manipulated by the attacker in-order to reduce the overall

trust and performance of the system in MSN. SA 1, SA 2

and SA 3 are the three types of Sybil attacks. Of these

attacks only SA 3 attack is found in the mobile domain.

Other attacks are found in domains like social domain

and sensing domain. They do nothing with mobility. Thus

handling SA3 attack is also one of the open problems to

be solved in MSN.

C. Existing Solutions for the Above Issues

Detailed explanation and solution for the above said

problems like direct anonymity, indirect or K anonymity

and other attacks are given in [10]. Here a system called

Identity Server is designed and implemented in-order to

protect MSN from the above said problems. This Identity

Server is a trust server, which generates a nonce called

Anonymous Identifier (AID). This AID is used to protect

the risk of hacking the shared social network ID of the

user. Similarly, building of minimal set in the K-

anonymity issue is also a great challenge. Its solution is

also given here.

Details about trust relations are given in [11]. Trust

relations can be represented by social ties which can be

seen among people in same social communities and

groups having similar interests and backgrounds. The

strength of social ties decides the possibility of data

transfer among the users.

The following are some of the latest solutions for spam

filtering:

E-mail spam filtering: Content based e-mail spam

filtering is seen in [12]. This paper makes use of push

technology to push reports regarding spam to the user's

social network friends who are having similar interests.

This filtering technique makes use of combination of both

Bayesian filter and interest based spam filter. The results

show that this technique is better than basic Bayesian

filtering scheme.

An adaptive privacy preserving spam filtering scheme

is seen in [13]. Spam detection is done using HTML

contents in Email so that near duplicate matching scheme

becomes efficient. The results show accuracy in spam

classification and privacy policy prediction. There are

papers on non-content based e-mail spam filtering also.

SOAP [14] is a combination of both the filtering

methods, Content based filtering and non-content based

filtering. SOAP works in a distributed manner and is a

combination of many modules like social closeness,

social interest, adaptive trust management and friend

notification in addition to basic Bayesian filter. The

results show that this technique is better than basic

Bayesian filtering scheme in terms of accuracy,

efficiency and attack-resilience.

Web spam filtering: [15] is content based web spam

filtering method. Normally spam detection happens in a

social network by using the spam knowledge of the same

network where spam detection wants to take place. But a

novel method is used where spam detection happens in a

social network by using the similar spam knowledge of

different networks. Two datasets: Twitter and Facebook

datasets are considered and analyzed here. The results

show that the spam detection in a network is affected and

improved by taking the combined similar spam

knowledge of different networks.

Another content based web spam filtering paper [16]

use the technology of Wikipedia, a crowd sourced

platform. This technique overcomes two main challenges

of social network such as dynamically changing

vocabulary and lack of context. Although this technique

is effective, it had many drawbacks. The two main

drawbacks here are, the Wikipedia information updates

are slower compared to other social networks like

Facebook and Twitter and also there exists lack of

demographic information of social network users.

A novel unique approach for detecting both social

spammers and spam messages using social contents in

micro-blogging is proposed here [17]. This paper is based

on non-content based filtering method. The main concept

used here is social spammers produce more spam

messages, so controlling social spammers can control

spam messages. Here social spammers are detected

taking into account the relationships between users-users,

users-messages and messages-messages. For this an

efficient optimization algorithm is used here. The time

consuming steps are tackled by using an accelerated

method. Finally, the effectiveness and efficiency of this

combined method is proved by performing experiments

on a real world micro-blog dataset.

R-SALSA is the algorithm proposed here [18]. This

model is an unsupervised approach and makes use of

both the content based and non-content based filtering

types. Spam scores of the messages and the reporter's

reliability factors are considered here to filter spam

527©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 5: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

contents. Hyves dataset is used here to evaluate this

model. The results show better performance when

compared with previous unsupervised approaches for

web spam filtering.

SMS/mobile spam filtering: [19] is a content based

mobile spam filtering scheme. Linguistic anti-spam

filtering approach is discussed here where two classifiers,

Naive Bayesian and Support Vector Machine, are used to

classify the SMS. The performance metrics are then

obtained for both classifiers using linguistic techniques

such as lemmatization and stop-words removal. The

obtained model is then subjected to multi objective

optimization algorithm to find out the optimal setup for

spam filtering. The results show that this method is

effective on both classifiers and have much impact on

Naive Bayesian classifier.

In this paper [20], a new model called Message Topic

Model is proposed for filtering SMS spam. This is also a

content based filter. This model is a derivation of

probability topic model. To overcome sparsity problem in

SMS classification, k means algorithm is used and also

symbol semantics are considered. This model is made

more efficient by considering background terms and

some preprocessing rules. The final results prove this

model to be more efficient when compared with other old

traditional models.

This spam filter [21] is designed for both SMS and

Instant messaging systems. Messages in such systems are

usually short and mixed with many symbols, idioms,

slangs and acronyms. This makes filtering more difficult

and incorrect. To overcome this problem a new model is

designed which is based on semantic and lexicographic

dictionaries together with techniques for context

detection and semantic analysis. Here original message is

normalized and expanded with help of above techniques

to make filtering more easy and accurate. The final

results proved this model to be effective.

One of the latest works on message spam filtering in

user-user domain is given in [22]. This filtering scheme

makes use of both the content based and non-content

based filtering ideas. Some of the recent research

solutions for Sybil attacks are seen in survey paper [23].

D. Proposed Solutions for the Above Issues

Most of the people are involved in social networking.

The growth of mobile devices had made social

networking easy to access at anytime and from anywhere.

This made way to mobile social networking. The

increasing demand in mobile social networking gave rise

to many security and privacy threats to the MSN users.

The security and privacy problems faced by these MSN

users are still unsolved. A proper and accurate solution is

needed for all the security and privacy issues in MSN.

This motivated to open the tunnel for research in this area.

There are many parts in this area of research which need

more concentration [24]. Some of the major parts which

need more concentration are as follows:

1) Fast and secured spam filter

A safe and secured spam filter should be built. Most of

the existing spam filters works with user-centralized

server domain. There are, only few spam filtering

systems that are available in user-local server domain.

Therefore a secured and fast spam filter that works with

user-local server domain and that too using any short

range communication technology is demanding.

To provide security, proper cryptographic schemes

should be deployed on this spam filter. Combining these

cryptographic schemes with spam filter involves

encryption and decryption of both the key and data which

in turn increases computation overhead as well as

communication overhead.

Increment in overheads reduces the life of power

resources in mobile devices. Thus a good cryptographic

scheme should be used which improves both the

overheads and consume low memory and power

resources. At the same time this scheme should perform

fast and should be secured.

Therefore a secured and lightweight cryptographic

scheme should be used to build a spam filter in mobile

devices for mobile social networking. For this, a lattice

based cryptographic scheme known as Number Theory

Research Unit's cryptosystem or NTRU's cryptosystem

[25] is used. This cryptosystem performs faster and

requires low memory consumption. Thus, it reduces

computation and communication overheads.

Fig. 4 shows basic NTRU based spam filtering model

in MSN which separates ham messages from spam

messages. This filtering model is faster and at the same

time secured from attackers. Here there are two types of

users: Local Server and Mobile User. Each user here

involves in forwarding message to the other mobile users

in the network and filtering happens before the message

is received by the other mobile users.

2) Gesture based secure information sharing

Mobile users share information between each other as

a part of mobile social networking. This shared

information should be kept secure. There are many

information sharing applications in MSNs and one such

application is e-business card sharing application. When

two unknown people meet each other, initially what they

do is to share their business card as a part of introduction.

With the growth of smart devices, e-business card came

into existence.

Now-a-days people don't use to carry business card

everywhere, instead they use e-business card which is

already stored in their smart devices. This e-business card

reveals the identity of the user. So it should be kept and

shared safely.

Two things must be ensured: that e-business card is not

forged and it is shared correctly only to the designated

user. First challenge can be solved by using digital

signatures and second challenge by using any short range

communication techniques so that two users can make

sure that the information is shared between themselves

and both exchanges correctly. But there are malicious

attackers out there who try to steal information through

hacking.

528©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 6: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

Fig. 4. Fast and secured spam filter in MSN

This problem can be avoided in a novel way by getting

use of any authentication scheme which is gesture based.

These gestures are used as temporary passwords before

sharing e-business card.

Basic processing architecture for gesture based e-

business card sharing is shown in Fig. 5. This acts like a

four way handshake protocol. Firstly, user B request user

A for e-business card. User A then initiates any gesture.

After watching this gesture of user A, user B should

correctly imitate the same gesture to user A. Then user A

checks for matching of the two gestures. If correct

matching, authentication of user B is confirmed and then

user A sends e-business card to user B, else neglects the

request of user B.

There are many existing works based on exchange of

e-business cards between mobile users. [26] is such a

work which is based on Wi-Fi direct technology without

using Internet connection. As part of security, here

authentication is done for communicating partner devices

using gestures. [27] is another recent gesture based work

that requires no customized wearable devices or any

external environmental instruments for information

sharing. This is a type of model that works in an

effortless way but consume lot of battery power and

energy.

Fig. 5. Gesture based secure information sharing

Therefore our proposed work should be a model that is

safe and secure from forged e-business cards, correct

delivery to authenticated as well as designated mobile

users and that consume low battery power and resource

energy.

3) Detection of mobile sybil attacks

Misbehaviour detection in MSNs is another important

research direction. Traditional misbehaviour detection

techniques are not so accurate when it comes to mobile

users. These attackers who manipulate the identity of the

original users are called Sybil attackers and they are

dangerous in MSN. As there is no pre-existing

knowledge between mobile users, detection of such

attackers accurately is not possible. This became a great

challenge for researchers.

Most of the existing schemes either depend on some

pre-defined user communities [28] or use any

cryptographic techniques [29] to avoid Sybil attacks. The

Sybil attackers therefore act similarly to normal

legitimate user inorder to overcome these traditional

detection methods. And also most of the existing schemes

are built on centralized environment which is not suitable

for mobile networks. To end this a novel method which

works on mobile environment with high detection

accuracy and low overhead is needed.

Thus, researchers thought of making use of existing

crowdsourcing techniques with the existing misbehaviour

detection techniques in MSN. This method helps the

mobile users to detect the mobile Sybil attackers in the

early stages itself. Here the detection results are

integrated and taken from the crowd of mobile users to

detect the attackers accurately. Therefore crowdsourcing

based Sybil attack detection is becoming a demanding

new future direction in MSN. Fig. 6 shows the basic

architecture for mobile Sybil detection along with

crowdsourcing techniques.

Fig. 6. Mobile Sybil attack Detector

V. CONCLUSIONS

This paper is a short overview of MSNs. The first half

is about some basic things about MSN like MSN's

architecture, communication patterns, usage, applications

and architectural components. The second half is about

the security and privacy in MSN. Some basic overlook on

security and privacy requirements, issues and solutions

are discussed. Recent related works based on the

solutions for privacy and security issues are also

comprised in this work. Towards the end of the paper

some proposed privacy and security solutions are also

discussed which can be useful for researchers who are

working in security and privacy for MSNs. Thus, this

paper gives some basic idea about MSNs and it's security

and privacy.

REFERENCES

[1] Z. Mao, Y. Jiang, G. Min, S. Leng, X. Jin, and K. Yang,

“Mobile social networks: Design requirements,

529©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 7: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

architecture, and state-of-the-art technology,” Computer

Communications, vol. 100, pp. 1-19, Mar. 2017.

[2] L. Monne and M. Villalba, “A survey of mobile social

networking,” Helsinki University, 2009.

[3] M. R. M. Veeramanickam and N. Radhika, “A smart e-

learning system for social networking,” International

Journal of Electrical and Computer Engineering, vol. 4, no.

3, p. 447, Jun. 2014.

[4] S. Sharma, R. Sreevathsan, M. V. V. N. S. Srikanth, C.

Harshith, and K. T. Gireesh, “Cognitive environment for

pervasive learners,” Communications in Computer and

Information Science, vol. 191, pp. 506-515, 2011.

[5] N. Kayastha, D. Niyato, P. Wang, and E. Hossain,

“Applications, architectures, and protocol design issues for

mobile social networks: A survey,” Proceedings of the

IEEE, vol. 99, no. 12, pp. 2130-2158, Dec. 2011.

[6] Proximity Marketing. [Online]. Available:

https://en.wikipedia.org/wiki/Proximity_marketing

[7] N. Vastardis and K. Yang, “Mobile social networks:

Architectures, social properties, and key research

challenges,” IEEE Communications Surveys & Tutorials,

vol. 15, no. 3, pp. 1355-1371, Jul. 2013.

[8] S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S.

Shamshirband, “Survey of main challenges (security and

privacy) in wireless body area networks for healthcare

applications,” Egyptian Informatics Journal, Nov. 2016.

[9] A. Abbas and S. U. Khan, “A review on the state-of-the-art

privacy-preserving approaches in the e-health clouds,”

IEEE Journal of Biomedical and Health Informatics, vol.

18, no. 4, pp. 1431-1441, Jul. 2014.

[10] A. Beach, M. Gartrell, and R. Han, “Solutions to security

and privacy issues in mobile social networking,” in Proc.

International Conference on Computational Science and

Engineering, vol. 4, pp. 1036-1042.

[11] X. Liang, K. Zhang, X. Shen, and X. Lin, “Security and

privacy in mobile social networks: challenges and

solutions,” IEEE Wireless Communications, vol. 21, no. 1,

pp. 33-41, Feb. 2014.

[12] X. Liu, Z. Xin, L. Shi, and Y. Wang, “A decentralized and

personalized spam filter based on social computing,” in

Proc. International Wireless Communications and Mobile

Computing Conference, 2014, pp. 887-894.

[13] P. Rajendran, M. Janaki, S. M. Hemalatha, and B.

Durkananthini, “Adaptive privacy policy prediction for

email spam filtering,” in Proc. Futuristic Trends in

Research and Innovation for Social Welfare (Startup

Conclave), World Conference on IEEE, 2016, pp. 1-4.

[14] H. Shen and Z. Li, “Leveraging social networks for

effective spam filtering,” IEEE Transactions on Computers,

vol. 63, no. 11, pp. 2743-2759, Nov. 2014.

[15] H. Xu, W. Sun, and A. Javaid, “Efficient spam detection

across online social networks,” in Proc. IEEE

International Conference Big Data Analysis, 2016, pp. 1-6.

[16] A. Sheth and P. Kapanipathi, “Semantic filtering for social

data,” IEEE Internet Computing, vol. 20, no. 4, pp. 74-78,

Jul 2016.

[17] F. Wu, J. Shu, Y. Huang, and Z. Yuan, “Co-detecting

social spammers and spam messages in microblogging via

exploiting social contexts,” Neurocomputing, vol. 201, pp.

51-65, Aug. 2016.

[18] M. Agrawal and R. L. Velusamy, “R-SALSA: A spam

filtering technique for social networking sites,” in Proc.

Electrical, Electronics and Computer Science (SCEECS),

IEEE Students' Conference, 2016, pp. 1-7.

[19] M. V. Aragão, E. P. Frigieri, C. A. Ynoguti, and A. P.

Paiva, “Factorial design analysis applied to the

performance of SMS anti-spam filtering systems,” Expert

Systems with Applications, vol. 64, pp. 589-604, Dec. 2016.

[20] J. Ma, Y. Zhang, J. Liu, K. Yu, and X. Wang, “Intelligent

SMS spam filtering using topic model,” in Proc. Intelligent

Networking and Collaborative Systems (INCoS),

International Conference on IEEE, 2016, pp. 380-383.

[21] T. A. Almeida, T. P. Silva, I. Santos, and J. M. G. Hidalgo,

“Text normalization and semantic indexing to enhance

instant messaging and SMS spam filtering,” Knowledge-

Based Systems, vol. 108, pp. 25-32, Sep. 2016.

[22] K. Zhang, X. Liang, R. Lu, and X. Shen, “PIF: A

personalized fine-grained spam filtering scheme with

privacy preservation in mobile social networks,” IEEE

Transactions on Computational Social Systems, vol. 2, no.

3, pp. 41-52, Sep. 2015.

[23] M. L. Valarmathi, A. Meenakowshalya, and A. Bharathi,

“Robust Sybil attack detection mechanism for Social

Networks-a survey,” in Proc. 3rd International Conference

on Advanced Computing and Communication Systems,

2016, vol. 1, pp. 1-5.

[24] Z. Kuan, “Security and Privacy for Mobile Social

Networks,” Ph.D. dissertation, Dept. Elect and Computer

Eng., Waterloo Univ., Ontario, Canada, 2016.

[25] S. Bu and H. Zhou, “A secret sharing scheme based on

NTRU algorithm,” in Proc. Wireless Communications,

Networking and Mobile Computing, WiCom'09. 5th

International Conference on IEEE, 2009, pp. 1-4.

[26] R. Kanaoka and Y. Tobe, “Design of a data transfer system

on smartphones using Wi-Fi direct and accelerometers,” in

Proc. 3rd Global Conference on Consumer Electronics,

Oct. 7, 2014, pp. 71-75.

[27] M. Bâce, G. Sörös, S. Staal, and G. Corbellini,

“HandshakAR: Wearable augmented reality system for

effortless information sharing,” in AH p. 34, Mar 16, 2017.

[28] W. Chang, J. Wu, C. C. Tan, and F. Li, “Sybil defenses in

mobile social networks,” in Proc. Global Communications

Conference (GLOBECOM), Dec. 9, 2013, pp. 641-646.

[29] X. Lin, “LSR: Mitigating zero-day sybil vulnerability in

privacy-preserving vehicular peer-to-peer networks,” IEEE

Journal on Selected Areas in Communications vol. 31, no.

9, pp. 237-46, Sep. 2013.

Vimitha R Vidhya Lakshmi was born in

Kerala, India, in 1990. She received the B.

Tech. degree in Information Technology

and the M. Tech. degree in Computer and

Information Science from the Cochin

University of Science and Technology

(CUSAT), India, in 2012 and 2015

respectively. She is currently pursuing the

Ph.D. degree with TIFAC-CORE in cyber security, Amrita

530©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017

Page 8: Mobile Social Networks: Architecture, Privacy, Security Issues … · 2017-09-28 · Social networks, Mobile social networks, architecture, security, privacy. I. I NTRODUCTION Communication

University, India. Her research interests include mobile

computing, information security and wireless communication.

Gireesh Kumar T was born in Kerala,

India, in 1976. He received the M. Tech.

degree from the Cochin University of

Science and Technology (CUSAT), India,

in 2003 and the Ph.D. degree from Anna

University, India, in 2011, both in

Computer Science and Engineering. He

is currently working as associate

professor with TIFAC-CORE in cyber security, Amrita

University, India. His research interests include wireless

communication, machine learning, algorithm and artificial

intelligence.

531©2017 Journal of Communications

Journal of Communications Vol. 12, No. 9, September 2017