College of Engineering

How to Exploit Social Network Theory in Wireless Design

UFL homepage

Project Information

  • NeTS:Small: How to Exploit Social Network Theory in Designing Secure Wireless Networks (CNS-0916391), PI. National Science Foundation, September 1, 2009-August 31, 2013.
  • This webpage and the materials provided here are based upon work supported by the National Science Foundation under Grant No. CNS-0916391.

    Project Summary

    Securing cyberspace is one of the top priorities in protecting our national infrastructure. As wireless ad hoc networks (WANETs) have been built to access or been parts of the Internet, they become the weakest links which should be secured and protected. This project investigates security issues in WANETs, such as trust establishment and management, secure connectivity, efficient secure routing and their performance, by utilizing the social network theory (including tools such as graph theory and percolation theory). First, the results in empirical social networks and observations can be utilized to improve our understanding of the properties of the trust and physical network graphs, the existence and distribution of secure paths, and secure connectivity in WANETs. Second, by mimicking the social behavior of individuals, new methodologies can be established and developed to design efficient and scalable multi-hop communication schemes in WANETs. Finally, the project investigates the secure efficiency of a WANET as the end-to-end secure throughput and delay and conduct formal analysis of secure network performance and trade-off between security and throughput/delay. This project opens a new research direction in wireless networks and develops novel network design methodologies in network science.

    The proposed research has broad impacts in many aspects including securing national cyberspace, creating multidisciplinary research themes mixing sociology, mathematics and wireless networks, disseminating the research findings to multiple communities of interest through publications in journals and conferences, and training the future multidisciplinary work force for telecommunications and information industries.


    Personnel


    Publications

    Papers in Books

    1. J. Sun, X. Zhu and Y. Fang, "Security and privacy for mobile health-care (m-Health) systems," in: Handbook on Securing Cyber-Physical Critical Infractructure, edited by Sajal Das, Krishna Kant and Nan Zhang, Morgan Kaufmann, 2012.

    Papers in Magazines

    1. C. Zhang, J. Sun, X. Zhu and Y. Fang, "Privacy and security for online social networks: challenges & opportunities," IEEE Network, vol.24, no.4, pp.13-18, July/August 2010.
    2. J. Sun, Y. Fang and X. Zhu, ``Privacy and emergency response in E-Healthcare leveraging wireless body sensor networks,'' IEEE Wireless Communications, vol.17, no.1, pp.66-73, February 2010.

    Papers in Refereed Journals

    1. L. Guo, C. Zhang, J. Sun and Y. Fang, "A privacy-preserving attribute-based authentication system for mobile health networks," IEEE Transactions on Mobile Computing, 2013. Accepted.
    2. H. Lin, X. Zhu, Y. Fang, D. Xing, C. Zhang, and Z. Cao, "Efficient trust based information sharing over distributed collaborative networks," IEEE Journal on Selected Areas in Communications, 2013. Accepted.
    3. H. Yue, C. Zhang, M. Pan, Y. Fang and S. Chen, "Unknown-target information collection in sensor-enabled RFID systems," IEEE/ACM Transactions on Networking, 2013. Accepted.
    4. R. Huang, H. Zhao and Y. Fang, "Mitigating location management traffic via aggregation in multi-hop cellular networks," Wireless Networks, vol.19, no.7, pp.1563-1575, October 2013.
    5. H. Fu, T. Chen, P. Lin and Y. Fang, "Tradeoff between energy efficiency and report validity for mobile sensor networks," ACM Transactions on Sensor Networks, vol.9, no.4, 2013.
    6. H. Lin, C. Zhang, J. Shao and Y. Fang, "CAM: cloud-assisted privacy preserving mobile health monitoring," IEEE Transactions on Information Forensics & Security, vol.8, no.6, pp.985-997, June 2013.
    7. H. Lin and Y. Fang, "Privacy-aware profiling and statistical data extraction for smart sustainable energy systems," IEEE Transactions on Smart Grid, vol.4, no.1, pp.332-340, March 2013.
    8. P. Li and Y. Fang, "On the throughput capacity of heterogeneous wireless networks," IEEE Transactions on Mobile Computing, vol.11, no.12, pp.2073-2086, December 2012.
    9. P. Li, M. Pan and Y. Fang, "Capacity bounds of three-dimensional wireless ad hoc networks," IEEE/ACM Transactions on Networking, vol.20, no.4, pp.1237-1245, August 2012.
    10. P. Li, Y. Fang, J. Li and X. Huang, "Smooth trade-offs between throughput and delay in mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol.11, no.3, pp.427-438, March 2012.
    11. M. Pan, C. Zhang, P. Li and Y. Fang, "Spectrum harvesting and sharing in multi-hop CRNs under uncertain spectrum supply," IEEE Journal on Selected Areas in Communications (Special Issue on Cooperative Networking Challenges and Applications), vol.30, no.2, pp.369-378, February 2012.
    12. P. Li, C. Zhang and Y. Fang, "The capacity of wireless ad hoc networks using directional antennas," IEEE Transactions on Mobile Computing, vol.10, no.10, pp.1374-1387, October 2011.
    13. W. Liu, C. Zhang, G. Yao and Y. Fang, "DELAR: a device-energy-load aware relaying framework for heterogeneous mobile ad hoc networks," IEEE Journal on Selected Areas in Communications (Special Issue on Energy Efficient Wireless Communications), vol.29, no.8, pp.1572-1584, September 2011.
    14. M. Pan, J. Sun, and Y. Fang, ``Purging the back-room dealing: secure spectrum auction leveraging Paillier cryptosystem,'' IEEE Journal on Selected Areas in Communications (Special Issue on Cognitive Radio Networking and Communications), vol.29, no.4, pp.866-876, April 2011.
    15. C. Zhang, Y. Song, Y. Fang and Y. Zhang, "On the price of security in large-scale wireless ad hoc networks," IEEE/ACM Transactions on Networking, vol.19, no.2, pp.319-332, April 2011.
    16. J. Sun, X. Zhu, C. Zhang and Y. Fang, ``RescueMe: location-based secure and dependable VANETs for disaster rescue,'' IEEE Journal on Selected Areas in Communications (Special Issue on Vehicular Communications and Networks), vol.29, no.3, pp.659-669, March 2011.
    17. Y. Song and Y. Fang, ``Cross layer interactions in multi-hop wireless sensor networks: a constrained queueing model,'' ACM Transactions on Modeling and Computer Simulation, vol.21, no.1, article no. 4, December 2010.
    18. J. Sun, C. Zhang, Y. Zhang and Y. Fang, ``An identity-based security system for user privacy in vehicular ad hoc networks,'' IEEE Transactions on Parallel and Distributed Systems,vol.21, no.9, pp.1227-1239, September 2010.
    19. C. Zhang, Y. Zhang and Y. Fang, ``A coverage inference protocol for wireless sensor networks,'' IEEE Transactions on Mobile Computing, vol.9, no.6, pp.850-864, June 2010.
    20. J. Sun and Y. Fang, ``Cross-domain delegation for sensitive data sharing in distributed electronic health record systems,'' IEEE Transactions on Parallel and Distributed Systems, vol.21, no.6, pp.754-764, June 2010.
    21. Y. Song, C. Zhang and Y. Fang, ``Stochastic traffic engineering in multi-hop cognitive wireless mesh networks,'' IEEE Transactions on Mobile Computing, vol.9, no.3, pp.305-316, March 2010.
    22. Y. Song, X. Zhu, Y. Fang and H. Zhang, ``Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs,'' IEEE Transactions on Wireless Communications, vol.9, no.1, pp.318-327, January 2010.
    23. P. Li and Y. Fang, ``Impacts of topology and traffic pattern on capacity of hybrid wireless networks,'' IEEE Transactions on Mobile Computing, vol.8, no.12, pp.1585-1595, December 2009.
    24. X. Yin, X. Zhou, R. Huang, Y. Fang and S. Li, ``A fairness-aware congestion control scheme in wireless sensor networks,'' IEEE Transactions on Vehicular Technology, vol.58, no.9, pp.5225-5234, November 2009.

    Papers in Refereed Conferences

    1. L. Guo, C. Zhang, H. Yue and Y. Fang, "A privacy-preserving social-assisted mobile content dissemination scheme in DTNs," The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 14-19, 2013.
    2. X. Liu, K. Liu, L. Guo, X. Li and Y. Fang, "A game-theoretic approach for achieving k-anonymity in location based services," The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 14-19, 2013.
    3. L. Guo, X. Liu, Y. Fang and X. Li, "User-centric private matching for eHealth networks-a social perspective," IEEE Globecom, Anaheim, CA, December 2012.
    4. L. Guo, C. Zhang, J. Sun and Y. Fang, ``PAAS: privacy-preserving attribute-based authentication system for eHealth networks,'' The 32nd IEEE International Conference on Distributed Computing Systems (ICDCS'2012), Macau, China, 18-21 June, 2012.
    5. H. Zhao, M. Pan, X. Liu, X. Li and Y. Fang, ``Optimal resource rental planning for elastic applications in cloud market,'' The 26th IEEE International Parallel & Distributed Processing Symposium (IPDPS'12), Shanghai, China, 21-25 May, 2012.
    6. H. Yue, C. Zhang, M. Pan, Y. Fang and S. Chen, ``A time-efficient information collection protocol for large-scale RFID systems,'' The 31th IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, 25-30 March, 2012.
    7. X. Liu, H. Zhao, M. Pan, H. Yue, X. Li and Y. Fang, ``Traffic-aware multiple mix zone placement for protecting location privacy,'' The 31th IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, 25-30 March, 2012.
    8. H. Fu, H. Chen, P. Lin and Y. Fang, ``Energy-efficient reporting mechanisms for multi-type real-time monitoring in machine-to-machine communications networks,'' The 31th IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, Florida, USA, 25-30 March, 2012.
    9. M. Pan, H. Li, P. Li and Y. Fang, ``Dealing with the untrustworthy auctioneer in combinatorial spectrum auction,'' IEEE Globecom, Houston, Texas, USA, 5-9 December, 2011.
    10. L. Guo, X. Zhu, C. Zhang and Y. Fang, ``A multi-hop privacy-preserving reputation scheme in online social networks,'' IEEE Globecom, Houston, Texas, USA, 5-9 December, 2011.
    11. H. Yue, M. Pan, R. Huang, H. Zhao and Y. Fang, ``LIP: a Light-weighted session-based incentive protocol for multi-hop cellular networks,'' IEEE Globecom, Houston, Texas, USA, 5-9 December, 2011.
    12. H. Lin, X. Zhu, C. Zhang, Y. Fang and Z. Cao, ``Efficient trust based information sharing schemes over distributed collaborative networks,'' IEEE Milcom, Baltimore, Maryland, USA, 7-10 November, 2011.
    13. X. Huang, D. Lu, P. Li and Y. Fang, ``Coolest path: spectrum mobility aware routing metrics in cognitive ad hoc networks,'' The 31st IEEE International Conference on Distributed Computing Systems (ICDCS'2011), Minneapolis, Minnesota, USA, 20-24 June, 2011.
    14. J. Sun, X. Zhu, C. Zhang and Y. Fang, ``HCPP: cryptography based secure EHR system for patient privacy and emergency Healthcare,'' The 31st IEEE International Conference on Distributed Computing Systems (ICDCS'2011), Minneapolis, Minnesota, USA, 20-24 June, 2011.
    15. C. Zhang, X. Zhu, Y. Song and Y. Fang, ``C4: a new paradigm for providing incentives in multi-hop wireless networks,'' The 30th IEEE International Conference on Computer Communications (INFOCOM'11), Shanghai, China, 10-15 April, 2011.
    16. P. Li, X. Huang and Y. Fang, ``Capacity scaling of multihop cellular networks,'' The 30th IEEE International Conference on Computer Communications (INFOCOM'11), Shanghai, China, 10-15 April, 2011.
    17. P. Li, M. Pan and Y. Fang, ``The capacity of three-dimensional wireless ad hoc networks,'' The 30th IEEE International Conference on Computer Communications (INFOCOM'11), Shanghai, China, 10-15 April, 2011.
    18. M. Pan, C. Zhang, P. Li and Y. Fang, ``Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply,'' The 30th IEEE International Conference on Computer Communications (INFOCOM'11), Shanghai, China, 10-15 April, 2011.
    19. J. Sun, X. Zhu and Y. Fang, ``Preserving privacy in emergency response based on wireless body sensor networks,'' IEEE Globecom, Miami, Florida, 6-10 December, 2010.
    20. M. Pan, H. Yue, Y. Fang and H. Li, ``The X Loss: band-mix selection with uncertain supply for opportunistic spectrum accessing,'' IEEE Globecom, Miami, Florida, 6-10 December, 2010.
    21. M. Pan, Y. Song, P. Li and Y. Fang, ``Reward and risk for opportunistic spectrum accessing in cognitive radio networks,'' IEEE Globecom, Miami, Florida, 6-10 December, 2010.
    22. C. Zhang, X. Zhu, Y. Song and Y. Fang, ``Toward a formalization for trust-based routing in wireless ad hoc networks,'' The 29th IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, California, USA, March 15-19, 2010.
    23. P. Li, Y. Fang and J. Li, ``Throughput, delay, and mobility in wireless ad hoc networks,'' The 29th IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, California, USA, March 15-19, 2010.
    24. P. Li and Y. Fang, ``The capacity of heterogeneous wireless networks,'' The 29th IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, California, USA, March 15-19, 2010.
    25. J. Sun, X. Zhu and Y. Fang, ``A privacy-preserving scheme for online social networks with efficient revocation,'' The 29th IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, California, USA, March 15-19, 2010.
    26. Y. Song, C. Zhang, Y. Fang and Z. Niu, ``Energy-conserving scheduling in multi-hop wireless networks with time-varying channels,'' The 29th IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, California, USA, March 15-19, 2010.
    27. Y. Song, X. Zhu, Y. Fang and H. Zhang, ``Rethinking thresholds-based rate adaptation algorithms: a reverse engineering perspective,'' (poster presentation), IEEE Globecom, Honolulu, Hawaii, 30 November- 4 December, 2009.

    You are the visitor since July 22, 1999.