Proceedings of the 2008 ACM CoNEXT Conference on - CONEXT '08 2008
DOI: 10.1145/1544012.1544047
|View full text |Cite
|
Sign up to set email alerts
|

Social DTN routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Most of these defenses weigh trust in the social graph, and an algorithmic property that makes the operation of the defense on top of social network at reasonable cost. Routing and information sharing using social networks is explored in [4], [5], [6], [8], [20], [21] for different settings, where it is shown that connectivity in social graphs can be of benefit in disconnected networks. However, in all of those works collaboration is assumed to be categorical, and there were no attempts in the literature to characterize collaboration and understand how it impacts the cost of operating such routing and sharing algorithms and applications on top of social networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of these defenses weigh trust in the social graph, and an algorithmic property that makes the operation of the defense on top of social network at reasonable cost. Routing and information sharing using social networks is explored in [4], [5], [6], [8], [20], [21] for different settings, where it is shown that connectivity in social graphs can be of benefit in disconnected networks. However, in all of those works collaboration is assumed to be categorical, and there were no attempts in the literature to characterize collaboration and understand how it impacts the cost of operating such routing and sharing algorithms and applications on top of social networks.…”
Section: Related Workmentioning
confidence: 99%
“…This popularity of social networks has motivated a wide spectrum of new technologies. Algorithms, protocols, and systems have been widely proposed on top of social networks, including applications to random-walk based routing [4]- [8], shortest-path based routing [9]- [11], social gossip [12]- [14], Sybil defenses [15]- [17], anonymous communication systems [18], [19], and information sharing [20], [21], among other technologies. Open-source software package of routing on top of social networks is available in [22], and is based on an ealier work that appeared in [23].…”
Section: Introductionmentioning
confidence: 99%
“…In the recent literature, there has been a lot of interest in the distributed computing community for exploiting social networks to perform trustworthy computations. Examples of these literature works include exploiting social networks for cryptographic signing services [22], Sybil defenses (i.e., addressing attacks in which a single node creates multiple identities and tries to act as if it is multiple nodes to tamper with the normal operation of a distributed system) [11], [23], and routing in many settings including the delay tolerant networks [24], [25]. In all of these cases, along with the algorithmic property in these social networks, the built designs exploit the trust in social networks.…”
Section: The Case For Socialcloudmentioning
confidence: 99%
“…Systems built on top of social networks include file sharing [32], [7], [41], [26], anonymous communication [42], [33], Sybil defenses [11], [23], [43], [44], [10], [26], routing [24], [25], [45], referral and filtering [46], content distribution [47], [48], and live streaming systems [49], among many others [50]. Most of these systems use social networks' trust and connectivity for their operation.…”
Section: Related Workmentioning
confidence: 99%
“…These include random-walk based routing [1], [4], [6], [15], [16], shortest-path based routing [23], [10], Sybil defenses [28], [29], among other technologies.…”
Section: Introductionmentioning
confidence: 99%