Secure and Efficient Mobile Social Networks
Research Goal:
Opportunistic routing research for mobile social networking applications. Allow users to interact, publish messages, and discover others that share common interests in an intermittent network using Bluetooth, Zigbee, and other low power opportunistic wireless networks, with peer-to-peer WiFi and infrastructure WiFi.
Project Sponsors over time
National Science Foundation I/UCRC for Space, High-Performance, and Resilient Computing. (SHREC)
DARPA
MIT LINCOLN LABS
ESPRE TECHNOLOGIES
Relevant Publications:
Patents
- C. Baker, J. Almodovar-Faira and J. McNair, Ad Hoc Social Network (AHSN) System, AHSN-Enabled Device and Methods of Use, U. S. Patent Application, Serial No.PCT/US16/31454; filed May 9, 2016. https://patents.google.com/patent/US10694362B2
Books
- R. Beyah, J. McNair, C. Corbett, book editors, Security in Ad Hoc and Sensor Networks, World Scientific Publishing, Inc., 2009, ISBN-10: 981427108X.
Ten Related Papers
- A. Abiru, K. Morman, A. Costin, and J. McNair, “Poster: SMGP-IoT: A Simultaneous Multi-Protocol Gateway for IoT Access Networks”, IEEE Military Communications Conference (Milcom), Student Workshop, October 2024.
- U. Sunkara, A. Abiru, K. Morman, and A. Costin, “Poster: Hardware Security for IoT Wireless Networks,” IEEE Conference on Network Sofwarization (NetSoft), June 2024. (McNair’s name withheld to avoid conflict due to Co-Chair role at NetSoft 2024.)
- A. del Aguila, J. Valdez, S. B. Mandavilli, and J. McNair, “Remote and Rural Connectivity via Multi-tier Systems through SDN-Managed Drone Networks,” IEEE Military Communications Conference, December 2022.
- Nagaraj, Keerthiraj, Bhasale, S. S., McNair, J., and Helmy, A. “Vulnerability Assessment and Classification based on Influence Metrics in Mobile Social Networks.” Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access. 2019.
- Starke, A., Nie, Z., Hodges, M., Baker, C., & McNair, J. (2019, November). Denial of Service Detection & Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN). IEEE Military Communications Conference (MILCOM) (pp. 1-6). IEEE.
- C. Baker, A. Starke, T. G. Hill-Jarrett, and J. McNair. “In vivo evaluation of the secure opportunistic schemes middleware using a delay tolerant social network,” IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2537-2542, 2017.
- C. Baker, A. Starke, and J. McNair, “Enabling Delay Tolerant Networks on iOS Using the Secure Opportunistic Schemes Middleware,” 1st US-Japan Workshop Enabling Global Collaborations in Big Data Research, June 2017.
- C. Baker, A. Starke, S. Xing, and J. McNair. “Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks.” IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 978-979, 2017.
- C. Baker, J. Almodovar-Faria, P. St. Juste, and J. McNair, “Low-Energy Socially Cognizant Routing for Delay Tolerant Mobile Networks,” IEEE MilCom, pp.299-304, November 2013.
- E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks Journal, vol 6, no 2, pp. 195–209, April 2007.
