Message content protected forwarding mechanism for intermittent connectivity Ad-hoc networks

被引:0
|
作者
Wu, Da-Peng [1 ]
Zhou, Zhi-Nan [1 ]
Zhang, Yan [2 ]
Wang, Ru-Yan [1 ]
机构
[1] Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing
[2] China Academy of Telecommunications Research of MIIT, Beijing
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2015年 / 37卷 / 06期
关键词
Ad-hoc networks; Confidentiality; Message forwarding; Node similarity;
D O I
10.11999/JEIT141259
中图分类号
学科分类号
摘要
In the resource-constrained intermittent connectivity Ad-hoc networks, the wireless media is shared by collaborated nodes for message forwarding, and the confidentiality of messages is particularly vulnerable. To protect the confidentiality of the message content, a message forwarding mechanism for intermittent connectivity Ad-hoc networks is proposed. In this mechanism, the original message is sliced into several pieces to conceal the confidentiality, then taking advantage of the redundancy of message forwarding process from multi-copy routing and the node similarity, the forwarding paths of each piece are controlled to be disjoined. Consequently, the ferry nodes collect these pieces, verify their reliability, and restore to the original message, then encrypt it where only the destination node can decrypt the ciphertext. Finally, the confidentiality and integrity of messages in the forwarding process can be achieved. Numerical analysis shows that under the premise of network performance guaranty, the proposed mechanism can effectively protect the confidentiality of the message. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:1271 / 1278
页数:7
相关论文
共 16 条
  • [1] Thrasyvoulos S., Rao N., Bin R., Et al., Routing for disruption tolerant networkS: taxonomy and design, Wireless Network, 8, 16, pp. 2349-2370, (2010)
  • [2] Su J.-S., Hu Q.-L., Zhao B.-K., Routing techniques on delay/disruption tolerant networks, Journal of Software, 21, 1, pp. 120-124, (2010)
  • [3] Anand D., Khemchandani V., Sharma R.K., Identity-based cryptography techniques and applications (a review), Proceedings of the 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 343-348, (2013)
  • [4] Guo L., Zhang C., Yue H., Et al., PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs, IEEE Transactions on Mobile Computing, 13, 12, pp. 2903-2918, (2014)
  • [5] Jia Z., Lin X., Tan S.H., Et al., Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Network and Computer Applications, 35, 3, pp. 905-913, (2012)
  • [6] Zhao W., Ammar M., Zegura E., A message ferrying approach for data delivery in sparse mobile Ad Hoc networks, Proceedings of the 5th International Symposium on Mobile Ad Hoc Networking and Computing, pp. 187-198, (2004)
  • [7] Xue L., Liu J., Peng J., An adaptive message ferry routing algorithm for delay tolerant networks, Proceedings of the 14th International Conference on Communication Technology (ICCT), pp. 699-703, (2012)
  • [8] Wang X., Chen M., Zhang G., Et al., HMFRS: a hierarchical multiple ferries routing scheme for clustered DTNs, Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1-4, (2012)
  • [9] Wang Y., Peng W., Dou Q., Energy-constrained ferry route design for sparse wireless sensor networks, Journal of Central South University, 20, 11, pp. 3142-3149, (2013)
  • [10] Fall K., Farrell S., DTN: an architectural retrospective, IEEE Journal on Selected Areas in Communications, 26, 5, pp. 828-836, (2008)