{"id":405,"date":"2020-02-29T19:47:44","date_gmt":"2020-02-29T19:47:44","guid":{"rendered":"http:\/\/wam.ece.ufl.edu\/?page_id=405"},"modified":"2026-04-10T09:21:05","modified_gmt":"2026-04-10T14:21:05","slug":"msns","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/wam\/research\/msns\/","title":{"rendered":"Secure and Efficient Mobile Social Networks"},"content":{"rendered":"<p><a href=\"https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-401 size-medium\" src=\"https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf-300x169.jpg\" alt=\"Map of the University of Florida campus with numbered nodes and connecting paths illustrating an opportunistic wireless network topology for mobile social networking research\" width=\"300\" height=\"169\" srcset=\"https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf-300x169.jpg 300w, https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf-1024x576.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf-768x432.jpg 768w, https:\/\/faculty.eng.ufl.edu\/wam\/wp-content\/uploads\/sites\/693\/2020\/02\/mobile-social-uf.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h4>Secure and Efficient Mobile Social Networks<\/h4>\n<p><strong>Research Goal:<\/strong><\/p>\n<p>Opportunistic routing research for mobile social networking applications. Allow users to interact, publish messages, and discover others that share common interests in an intermittent network using Bluetooth, Zigbee,\u00a0<span style=\"font-family: gentona, 'Helvetica Neue', Helvetica, Arial, sans-serif;font-size: 18px;font-style: normal;font-weight: 100\">and other low power opportunistic wireless networks, with <\/span>peer-to-peer WiFi and infrastructure WiFi.<\/p>\n<p><strong>Project Sponsors over time<\/strong><\/p>\n<h5>National Science Foundation I\/UCRC for Space, High-Performance, and Resilient Computing. (<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1738420&amp;HistoricalAwards=false\">SHREC<\/a>)<\/h5>\n<h5>DARPA<\/h5>\n<h5>MIT LINCOLN LABS<\/h5>\n<h5>ESPRE TECHNOLOGIES<\/h5>\n<p><strong>Relevant Publications:<\/strong><\/p>\n<p>Patents<\/p>\n<ol>\n<li style=\"text-align: left\">C. Baker, J. Almodovar-Faira and J. McNair, Ad Hoc Social Network (AHSN) System, AHSN-Enabled Device and Methods of Use, U. S. Patent Application, Serial No.PCT\/US16\/31454; filed May 9, 2016. <a href=\"https:\/\/patents.google.com\/patent\/US10694362B2\">https:\/\/patents.google.com\/patent\/US10694362B2<\/a><\/li>\n<\/ol>\n<p>Books<\/p>\n<ol>\n<li>R. Beyah, J. McNair, C. Corbett, book editors,<a href=\"https:\/\/www.amazon.com\/Security-Ad-Hoc-Networks-Computer-Network\/dp\/981427108X\">\u00a0Security in Ad Hoc and Sensor Networks<\/a>, World Scientific Publishing, Inc., 2009, ISBN-10: 981427108X.<\/li>\n<\/ol>\n<p>Ten Related Papers<\/p>\n<ol>\n<li>A. Abiru, K. Morman, A. Costin, and J. McNair, \u201cPoster: SMGP-IoT: A Simultaneous Multi-Protocol Gateway for IoT Access Networks\u201d, IEEE Military Communications Conference (Milcom), Student Workshop, October 2024.<\/li>\n<li>U. Sunkara, A. Abiru, K. Morman, and A. Costin, \u201cPoster: Hardware Security for IoT Wireless Networks,\u201d IEEE Conference on Network Sofwarization (NetSoft), June 2024. (McNair\u2019s name withheld to avoid conflict due to Co-Chair role at NetSoft 2024.)<\/li>\n<li>A. del Aguila, J. Valdez, S. B. Mandavilli, and J. McNair, \u201cRemote and Rural Connectivity via Multi-tier Systems through SDN-Managed Drone Networks,\u201d\u00a0 IEEE Military Communications Conference, December 2022.<\/li>\n<li>Nagaraj, Keerthiraj, Bhasale, S. S., McNair, J., and Helmy, A. \u201cVulnerability Assessment and Classification based on Influence Metrics in Mobile Social Networks.\u201d Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access. 2019.<\/li>\n<li>Starke, A., Nie, Z., Hodges, M., Baker, C., &amp; McNair, J. (2019, November).\u00a0Denial of Service Detection &amp; Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN). IEEE Military Communications Conference (MILCOM) (pp. 1-6). IEEE.<\/li>\n<li>C. Baker, A. Starke, T. G. Hill-Jarrett, and J. McNair. \u201cIn vivo evaluation of the secure opportunistic schemes middleware using a delay tolerant social network,\u201d IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2537-2542, 2017.<\/li>\n<li>C. Baker, A. Starke, and J. McNair, &#8220;Enabling Delay Tolerant Networks on iOS Using the Secure Opportunistic Schemes Middleware,&#8221; 1st US-Japan Workshop Enabling Global Collaborations in Big Data Research, June 2017.<\/li>\n<li>C. Baker, A. Starke, S. Xing, and J. McNair. \u201cDemo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks.\u201d\u00a0<i>IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)<\/i>, pp. 978-979, 2017.<\/li>\n<li>C. Baker, J. Almodovar-Faria, P. St. Juste, and J. McNair, \u201cLow-Energy Socially Cognizant Routing for Delay Tolerant Mobile Networks,\u201d IEEE MilCom, pp.299-304, November 2013.<\/li>\n<li>E. Ekici, S. Vural, J. McNair, and D. Al-Abri, \u201cSecure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,\u201d Elsevier Ad Hoc Networks Journal, vol 6, no 2, pp. 195\u2013209, April 2007.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Secure and Efficient Mobile Social Networks Research Goal: Opportunistic routing research for mobile social networking applications. Allow users to interact, publish messages, and discover others that share common interests in an intermittent network using Bluetooth, Zigbee,\u00a0and other low power opportunistic wireless networks, with peer-to-peer WiFi and infrastructure WiFi. Project Sponsors over time National Science Foundation [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"parent":11,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-405","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/pages\/405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":1,"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/pages\/405\/revisions"}],"predecessor-version":[{"id":3245,"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/pages\/405\/revisions\/3245"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/pages\/11"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/wam\/wp-json\/wp\/v2\/media?parent=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}