计算机科学 ›› 2014, Vol. 41 ›› Issue (10): 191-195.doi: 10.11896/j.issn.1002-137X.2014.10.042

• 信息安全 • 上一篇    下一篇

基于模糊身份密码学的机会网络身份认证方案

曹晓梅,殷瑛   

  1. 南京邮电大学计算机与软件学院 南京210003 江苏无线传感网高技术研究重点实验室 南京210003 南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京210003;南京邮电大学计算机与软件学院 南京210003 江苏无线传感网高技术研究重点实验室 南京210003 南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京210003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61202353),国家重点基础研究发展计划(973)(2011CB302903),江苏高校优势学科建设工程资助

Identity Authentication Scheme in Opportunistic Network Based on Fuzzy-IBE

CAO Xiao-mei and YIN Ying   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对机会网络的自组织性、开放性、连通性差等特点以及现有的基于上下文的路由协议中可能存在的隐私泄露等安全问题,提出了一种基于模糊身份密码学的身份认证方案F-ONIAS(Identity Authentication Scheme in Opportunistic Network Based on Fuzzy-IBE)。该方案通过一个无需实时在线的PKG为用户颁发私钥来解决机会网络中因节点无法实时连通而导致的传统非对称密码学方案不适用的问题。同时,将节点的生物信息作为身份标识,避免了传统身份密码学中身份信息可能被伪造而带来的安全隐患。仿真实验表明,在存在恶意节点的网络环境下,本方案比现有的经典路由协议方案拥有更高的报文投递率和更低的路由开销率,并且未对报文平均时延造成明显影响。

关键词: 机会网络,模糊身份密码学,基于社会上下文的路由

Abstract: An identity authentication scheme in opportunistic network was proposed based on Fuzzy-IBE,which can conform to the characteristics of self-organized management,openness and intermittent connectivity in opportunistic networks.The scheme is committed to addressing the security issues such as privacy leaks in the existing social context-based routing protocols.Because of the intermittent connectivity,the traditional cryptography cannot be applied to the opportunistic networks.So in F-ONIAS,an off-line PKG is used to generate private keys for users.Meanwhile,in identity-based cryptography,identity information may be forged.To avoid such security risks,the biological information is used as a node’s identifier.Simulation results show that implementing our security scheme does not induce any negative impact on the average delay,and achieves higher delivery probability and lower routing overhead rate.

Key words: Opportunistic networks,Fuzzy identity-based encryption,Social context-based routing

[1] 熊永平,孙利民,牛建伟,等.机会网络[J].软件学报,2009,0(1):124-137
[2] Grossglauser M,Tse D.Mobility increases the capacity of ad-hoc wireless networks[C]∥Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2001).2001,3:1360-1369
[3] Spyropoulos T,Psounis K,Raghavendra C S,et al.Single-copyrouting in intermittently connected mobile networks[C]∥2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks,2004(IEEE SECON 2004).IEEE,2004:235-244
[4] LeBrun J,Chuah C N,Ghosal D,et al.Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks[C]∥Vehicular technology conference,2005.VTC 2005-Spring.2005 IEEE 61st.IEEE,2005,4:2289-2293
[5] Jones E P C,Li L,Schmidtke J K,et al.Practical routing in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2007,6(8):943-959
[6] 李东生,杨志义,郭斌,等.基于机会网络的社会性活动组织研究[J].计算机科学,2013,40(2):35-39
[7] Hui P,Crowcroft J,Yoneki E.Bubble rap:Social-based forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2011,10(11):1576-1589
[8] Boldrini C,Conti M,Jacopini J,et al.Hibop:a history based routing protocol for opportunistic networks[C]∥ IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks,2007(WoWMoM 2007). IEEE,2007:1-12
[9] Lindgren A,Doria A,Schelén O.Probabilistic routing in intermittently connected networks[J].ACM SIGMOBILE Mobile Computing and Communications Review,2003,7(3):19-20
[10] Seth A,Keshav S.Practical security for disconnected nodes[C]∥1st IEEE ICNP Workshop on Secure Network Protocols,2005(NPSec).IEEE,2005:31-36
[11] Kate A,Zaverucha G M,Hengartner U.Anonymity and security in delay tolerant networks[C]∥Third International Conference on Security and Privacy in Communications Networks and the Workshops,2007(SecureComm 2007).IEEE,2007:504-513
[12] Shikfa A,Onen M,Molva R.Privacy in context-based and epidemic forwarding[C]∥IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks & Workshops,2009(WoWMoM 2009).IEEE,2009:1-7
[13] Trifunovic S,Legendre F.Trust in Opportunistic Networks[J].2009
[14] Kernen A,Ott J,Krkkinen T.The ONE simulator for DTN protocol evaluation[C]∥Proceedings of the 2nd International Conference on Simulation Tools and Techniques,ICST (Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering).2009:55

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!