skip to main content
10.1145/2079360.2079367acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Twitter in disaster mode: security architecture

Authors Info & Claims
Published:06 December 2011Publication History

ABSTRACT

Recent natural disasters (earthquakes, floods, etc.) have show that people heavily use platforms like Twitter to communicate and organize in emergencies. However, the fixed infrastructure supporting such communications may be temporarily wiped out. In such situations, the phones' capabilities of infrastructure-less communication can fill in: By propagating data opportunistically (from phone to phone), tweets can still be spread, yet at the cost of delays.

In this paper, we present Twimight and its network security extensions. Twimight is an open source Twitter client for Android phones featured with a "disaster mode", which users enable upon losing connectivity. In the disaster mode, tweets are not sent to the Twitter server but stored on the phone, carried around as people move, and forwarded via Bluetooth when in proximity with other phones. However, switching from an online centralized application to a distributed and delay-tolerant service relying on opportunistic communication requires rethinking the security architecture. We propose security extensions to offer comparable security in the disaster mode as in the normal mode to protect Twimight from basic attacks. We also propose a simple, yet efficient, anti-spam scheme to avoid users from being flooded with spam. Finally, we present a preliminary empirical performance evaluation of Twimight.

References

  1. A. Chowdhury, "Global pulse," http://blog.twitter.com/2011/06/global-pulse.html, 2011.Google ScholarGoogle Scholar
  2. A. Bruns, "Tracking crises on twitter: Analysing #qldfloods and #eqnz." Presented at the Emergency Media and Public Affairs Conference, Canberra, 2011.Google ScholarGoogle Scholar
  3. A. Vahdat and D. Becker, "Epidemic routing for partially-connected ad hoc networks," Tech. Rep., 2000.Google ScholarGoogle Scholar
  4. W. Zhao, M. Ammar, and E. Zegura, "A message ferrying approach for data delivery in sparse mobile ad hoc networks," in ACM MobiHoc, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Nordström, P. Gunningberg, and C. Rohner, "A search-based network architecture for content-oriented and opportunistic communication," Uppsala University Technical Report 2009--003, 2009, http://code.google.com/p/haggle.Google ScholarGoogle Scholar
  6. PodNet Project. {Online}. Available: http://www.podnet.ee.ethz.ch/Google ScholarGoogle Scholar
  7. T. Hossmann, F. Legendre, P. Carta, P. Gunningberg, and C. Rohner, "Twitter in disaster mode: Opportunistic communication and distribution of sensor data in emergencies," in ExtremeCom, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, "Wifi-opp: Ad-hoc-less opportunistic networking," in ACM CHANTS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Hossmann, T. Spyropoulos, and F. Legendre, "Know thy neighbor: Towards optimal mapping of contacts to social graphs for DTN routing," in IEEE Infocom, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. P. H. S. Capkun, L. Buttyan, "Self-organized public-key management for mobile ad-hoc networks," in IEEE Transactions on Mobile Computing, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. B. S. Capkun, J. P. Hubaux, "Mobility helps peer-to-peer security," in IEEE Transactions on Mobile Computing, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. R. Zimmermann, The Official PGP User's Guide, MIT press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Bruno, M. Conti, and E. Gregori, "Mesh networks: commodity multihop ad hoc networks," Communications Magazine, IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Twitter in disaster mode: security architecture

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SWID '11: Proceedings of the Special Workshop on Internet and Disasters
        December 2011
        74 pages
        ISBN:9781450310444
        DOI:10.1145/2079360

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 December 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader