SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks

被引:3
作者
Kumar, Prashant [1 ]
Chauhan, Naveen [1 ]
Chand, Narottam [1 ]
Awasthi, Lalit K. [2 ]
机构
[1] Natl Inst Technol Hamirpur, Hamirpur, India
[2] Dr BR Ambedkar Natl Inst Technol, Jalandhar, India
关键词
Delay Tolerant Networks; Opportunistic Networks; Privacy; Security; Security Framework; Trust Management; SCHEME;
D O I
10.4018/IJWSR.2018040103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an "opportunity" is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.
引用
收藏
页码:47 / 66
页数:20
相关论文
共 32 条
[1]  
Ahmad A, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1608, DOI 10.1109/ICACCI.2014.6968318
[2]   Defense against packet collusion attacks in opportunistic networks [J].
Alajeely, Majeed ;
Doss, Robin ;
Ahmad, Asma'a ;
Mak-Hau, Vicky .
COMPUTERS & SECURITY, 2017, 65 :269-282
[3]   Malicious Node Traceback in Opportunistic Networks Using Merkle Trees [J].
Alajeely, Majeed ;
Ahmad, Asma'a ;
Doss, Robin .
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, :147-152
[4]  
[Anonymous], 2012, INT J WIRELESS MOBIL
[5]  
[Anonymous], 2006, CHALLENGES PRIVACY S
[6]  
[Anonymous], 2011, 2011 P 20 INT C COMP, DOI DOI 10.1109/ICCCN.2011.6006047
[7]  
Bhargava B, 2004, IEEE INTELL SYST, V19, P74
[8]  
Chen X, 2015, CHINA COMMUN, V12, P117, DOI 10.1109/CC.2015.7114058
[9]   FAIR ALGORITHMS FOR MAXIMAL LINK ACTIVATION IN MULTIHOP RADIO NETWORKS [J].
CHLAMTAC, I ;
LERNER, A .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1987, 35 (07) :739-746
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654