Open Access Open Access  Restricted Access Subscription or Fee Access

Social Network De-Anonymization Attack Prevention in Mobile Adhoc Networks

William J. Burns, Arild Angelsen

Abstract


Social network examination is a way to approach the instance of trust in the interpersonal organization condition and distinguish the trust systems that arises between various people. Online networking had been endangered from the security viewpoints afterwards presenting incredible risk to clients concerning their own, educated person, profession property. The security issues that are inclined to web-based social networking and it clients which was figured out in this area. These security cause decrease in ranges from protection setting dangers, personality related assault, social assault, obscurity assault and data spillage assault. This paper points out the particular experiment of deriving progressive system from such interchanges. The system that we are particularly focused on Social Network Analysis (SNA), which is an arrangement of methodologies that take into consideration and investigated on social connections between components (e.g. individuals, gadgets or things). SNA to be observed to make complete system charts that can be evaluated openly and numerically (through a scope of SNA measurements) to help differentiate compelling hubs and additionally bunches inside the system. In this analysis, we came to know these kinds of security vulnerabilities can be reduced with strongest security improvements such as Authentication using OAuth2, Server & client communication using http2 protocol, etc.


Keywords


Social Network Analysis (SNA), De-Anonymization Attacks, Client Communication.

Full Text:

PDF

References


Barai S.V., Dikshit A. K., and Sharma S., ANN for Air quality Prediction –A comparative Study, J. Soft computing in Industrial applications, 39, 2007, 290—305.

Brahler, Stefan. "Analysis of the android architecture." Karlsruhe institute for technology 7.8 (2010).

Ellison, N. B. (2007). “Social network sites: Definition, history, and scholarship” Journal of Computer‐Mediated Communication, 13(1), pp. 210-230.

Grivas G., and Chaloulakou, A., Artificial neural network models for prediction of PM 10 hourly concentrations, in the Greater Area of Athens, Greece, J.Atmospheric Environment,40, 2006, 1216—1229.

Harold F. Tipton and Micki Krause, Information Security Management Handbook, (Florida: CRC Press, 2006).

Harold F. Tipton and Micki Krause, Information Security Management Handbook, (Florida: CRC Press, 2006).

Khizar Hameed, “Today's Social Network Sites: An Analysis of Emerging Security Risks and their Counter Measures”, 2017, ComTech

Kiley, Kevin J., Peter J. Cranstone, and Elizabeth A. Coker. "Contextual data communication platform." U.S. Patent No. 8,156,206. 10 Apr. 2012.

Mostafa Salama, “Computational Social Networks: Security and Privacy”, pringer-Verlag London 2013

Nagendra S. M., and Khare M., Artificial neural network approach for modeling nitrogen dioxide dispersion from vehicular exhaust emissions, J. Ecological Modelling, 190, 2006, 99-115.

R. Yu, Y. Yang, L. Yang, G. Han, and, O. A. Move, “RAQ–A random forest approach for predicting air quality in urban sensing systems,”s,e,nsors, vol. 16, no. 1, p. 86, 2016..

Rath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "An Overview on Social Networking: Design, Issues, Emerging Trends, and Security." Social Network Analytics: Computational Research Methods and Techniques 21 (2018).

Steve Ressler, “Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research”, HSAJ, VOL. II, NO. 2 (JULY 2006

Ulaa Alhaddad, “Security Metrics In Social Networking Applications “, IJSTR, Volume 3, Issue 1, January 2014

V. M. Niharika and P. S. Rao, “A survey on air quality forecasting techniques,” International Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp.103-107, 2014.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.