ABSTRACT

CONTENTS 11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 11.2 Taxonomy of Privacy-Preserving Opportunistic Protocols . . . . . . . . . . . 314 11.3 Attacker Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 11.4 Cryptography-Based Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

11.4.1 Private Contact Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 11.4.2 The MightBeEvil Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 11.4.3 The MobileFairPlay Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

11.4.3.1 Application to Interest-Cast . . . . . . . . . . . . . . . . . . . . . 322

11.4.4 Other Cryptography-Based Protocols . . . . . . . . . . . . . . . . . . . . . . . 329

11.5 Cryptography-Free Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 11.5.1 Probabilistic Profile-Based Routing . . . . . . . . . . . . . . . . . . . . . . . . 330

11.5.1.1 Forwarding Packet Condition . . . . . . . . . . . . . . . . . . . 331 11.5.1.2 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 332

11.5.2 Hide-and-Lie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 11.5.2.1 Simulations and Results . . . . . . . . . . . . . . . . . . . . . . . . 335

11.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

11.1 Introduction Opportunistic networks have recently attracted significant attention in the research community. This increasing interest in opportunistic networking is motivated by the fact that, given the growing popularity of smartphones and tablet PCs with peerto-peer communication capabilities, opportunistic exchange of information between individuals is deemed an emerging communication paradigm.