|
|
1 | (18) |
|
1.1 Mobile Social Network |
|
|
1 | (4) |
|
1.1.1 Mobile Social Network |
|
|
1 | (2) |
|
1.1.2 Mobile Applications |
|
|
3 | (2) |
|
1.2 Characteristics of MSN |
|
|
5 | (4) |
|
1.2.1 Multiple Communication Domains |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.2.4 Security and Privacy |
|
|
7 | (2) |
|
1.3 Research Topics in Mobile Social Network |
|
|
9 | (2) |
|
|
11 | (8) |
|
|
11 | (1) |
|
1.4.2 Multiple Pseudonym Technique |
|
|
11 | (1) |
|
1.4.3 Prediction Method: Autoregression |
|
|
12 | (1) |
|
1.4.4 Cryptographic Techniques |
|
|
13 | (6) |
|
2 Profile Matching Protocol with Anonymity Enhancing Techniques |
|
|
19 | (24) |
|
|
19 | (1) |
|
2.2 Network Model and Design Goal |
|
|
20 | (2) |
|
|
20 | (1) |
|
|
20 | (2) |
|
|
22 | (8) |
|
2.3.1 Approach 1: Explicit Comparison-Based Approach |
|
|
24 | (2) |
|
2.3.2 Approach 2: Implicit Comparison-Based Approach |
|
|
26 | (2) |
|
2.3.3 Approach 3: Implicit Predicate-Based Approach |
|
|
28 | (2) |
|
2.4 Anonymity Enhancing Techniques |
|
|
30 | (4) |
|
2.4.1 Anonymity Measurement |
|
|
30 | (2) |
|
2.4.2 Anonymity Enhancement |
|
|
32 | (2) |
|
2.5 Performance Evaluation |
|
|
34 | (5) |
|
|
35 | (1) |
|
|
36 | (3) |
|
|
39 | (1) |
|
2.7 Conclusion and Future Directions |
|
|
40 | (3) |
|
3 Cooperative Data Forwarding Strategy with Privacy Preservation |
|
|
43 | (24) |
|
|
43 | (1) |
|
3.2 Models and Design Goal |
|
|
44 | (3) |
|
3.2.1 Network Model and Social Behavior Model |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (11) |
|
3.3.1 Overview of the Protocol |
|
|
47 | (1) |
|
3.3.2 Phase 1: Privacy-Preserving Route-Based Authentication |
|
|
48 | (3) |
|
3.3.3 Phase 2: Proximity Measurement |
|
|
51 | (2) |
|
3.3.4 Phase 3: Morality-Driven Data Forwarding |
|
|
53 | (4) |
|
3.3.5 Summary of Data Forwarding Strategy |
|
|
57 | (1) |
|
3.4 Performance Evaluation |
|
|
58 | (6) |
|
3.4.1 Simulation Settings |
|
|
58 | (3) |
|
|
61 | (3) |
|
|
64 | (2) |
|
3.6 Conclusion and Future Directions |
|
|
66 | (1) |
|
4 Recommendation-Based Trustworthy Service Evaluation |
|
|
67 | (28) |
|
|
67 | (2) |
|
4.2 System Model and Design Goal |
|
|
69 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (11) |
|
4.3.1 Phase 1 of bTSE: Structured Reviews |
|
|
72 | (1) |
|
4.3.2 Phase 2 of bTSE: Token Generation |
|
|
73 | (3) |
|
4.3.3 Phase 3 of bTSE: Review Generation and Submission |
|
|
76 | (2) |
|
|
78 | (3) |
|
4.3.5 Summary of bTSE and SrTSE |
|
|
81 | (1) |
|
|
82 | (5) |
|
4.4.1 Resilience to Review Linkability Attacks |
|
|
82 | (1) |
|
4.4.2 Resilience to Review Rejection Attacks |
|
|
82 | (1) |
|
4.4.3 Resilience to Review Modification Attacks |
|
|
83 | (1) |
|
4.4.4 Resilience to Sybil Attacks |
|
|
84 | (1) |
|
4.4.5 Numerical Results of Detecting Sybil Attack |
|
|
85 | (2) |
|
4.5 Performance Evaluation |
|
|
87 | (4) |
|
|
88 | (1) |
|
|
89 | (2) |
|
|
91 | (1) |
|
4.7 Conclusion and Future Directions |
|
|
92 | (3) |
References |
|
95 | |