Computer Science ›› 2014, Vol. 41 ›› Issue (10): 191-195.doi: 10.11896/j.issn.1002-137X.2014.10.042

Previous Articles     Next Articles

Identity Authentication Scheme in Opportunistic Network Based on Fuzzy-IBE

CAO Xiao-mei and YIN Ying   

  • Online:2018-11-14 Published:2018-11-14

Abstract: An identity authentication scheme in opportunistic network was proposed based on Fuzzy-IBE,which can conform to the characteristics of self-organized management,openness and intermittent connectivity in opportunistic networks.The scheme is committed to addressing the security issues such as privacy leaks in the existing social context-based routing protocols.Because of the intermittent connectivity,the traditional cryptography cannot be applied to the opportunistic networks.So in F-ONIAS,an off-line PKG is used to generate private keys for users.Meanwhile,in identity-based cryptography,identity information may be forged.To avoid such security risks,the biological information is used as a node’s identifier.Simulation results show that implementing our security scheme does not induce any negative impact on the average delay,and achieves higher delivery probability and lower routing overhead rate.

Key words: Opportunistic networks,Fuzzy identity-based encryption,Social context-based routing

[1] 熊永平,孙利民,牛建伟,等.机会网络[J].软件学报,2009,0(1):124-137
[2] Grossglauser M,Tse D.Mobility increases the capacity of ad-hoc wireless networks[C]∥Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2001).2001,3:1360-1369
[3] Spyropoulos T,Psounis K,Raghavendra C S,et al.Single-copyrouting in intermittently connected mobile networks[C]∥2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks,2004(IEEE SECON 2004).IEEE,2004:235-244
[4] LeBrun J,Chuah C N,Ghosal D,et al.Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks[C]∥Vehicular technology conference,2005.VTC 2005-Spring.2005 IEEE 61st.IEEE,2005,4:2289-2293
[5] Jones E P C,Li L,Schmidtke J K,et al.Practical routing in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2007,6(8):943-959
[6] 李东生,杨志义,郭斌,等.基于机会网络的社会性活动组织研究[J].计算机科学,2013,40(2):35-39
[7] Hui P,Crowcroft J,Yoneki E.Bubble rap:Social-based forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2011,10(11):1576-1589
[8] Boldrini C,Conti M,Jacopini J,et al.Hibop:a history based routing protocol for opportunistic networks[C]∥ IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks,2007(WoWMoM 2007). IEEE,2007:1-12
[9] Lindgren A,Doria A,Schelén O.Probabilistic routing in intermittently connected networks[J].ACM SIGMOBILE Mobile Computing and Communications Review,2003,7(3):19-20
[10] Seth A,Keshav S.Practical security for disconnected nodes[C]∥1st IEEE ICNP Workshop on Secure Network Protocols,2005(NPSec).IEEE,2005:31-36
[11] Kate A,Zaverucha G M,Hengartner U.Anonymity and security in delay tolerant networks[C]∥Third International Conference on Security and Privacy in Communications Networks and the Workshops,2007(SecureComm 2007).IEEE,2007:504-513
[12] Shikfa A,Onen M,Molva R.Privacy in context-based and epidemic forwarding[C]∥IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks & Workshops,2009(WoWMoM 2009).IEEE,2009:1-7
[13] Trifunovic S,Legendre F.Trust in Opportunistic Networks[J].2009
[14] Kernen A,Ott J,Krkkinen T.The ONE simulator for DTN protocol evaluation[C]∥Proceedings of the 2nd International Conference on Simulation Tools and Techniques,ICST (Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering).2009:55

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!