ABSTRACT
CONTENTS 11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 11.2 Taxonomy of Privacy-Preserving Opportunistic Protocols . . . . . . . . . . . 314 11.3 Attacker Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 11.4 Cryptography-Based Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
11.4.1 Private Contact Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 11.4.2 The MightBeEvil Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 11.4.3 The MobileFairPlay Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
11.4.3.1 Application to Interest-Cast . . . . . . . . . . . . . . . . . . . . . 322
11.4.4 Other Cryptography-Based Protocols . . . . . . . . . . . . . . . . . . . . . . . 329
11.5 Cryptography-Free Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 11.5.1 Probabilistic Profile-Based Routing . . . . . . . . . . . . . . . . . . . . . . . . 330
11.5.1.1 Forwarding Packet Condition . . . . . . . . . . . . . . . . . . . 331 11.5.1.2 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 332
11.5.2 Hide-and-Lie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 11.5.2.1 Simulations and Results . . . . . . . . . . . . . . . . . . . . . . . . 335
11.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
11.1 Introduction Opportunistic networks have recently attracted significant attention in the research community. This increasing interest in opportunistic networking is motivated by the fact that, given the growing popularity of smartphones and tablet PCs with peerto-peer communication capabilities, opportunistic exchange of information between individuals is deemed an emerging communication paradigm.