首页 | 本学科首页   官方微博 | 高级检索  
     

机会网络中基于身份门限签名的可信路由
引用本文:陈曦,田有亮,李兴华,马建峰.机会网络中基于身份门限签名的可信路由[J].中国通信学报,2011,8(4):132-140.
作者姓名:陈曦  田有亮  李兴华  马建峰
摘    要:

收稿时间:2011-09-08;

Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks
Chen Xi,Tian Youliang,Li Xinghua,Ma Jianfeng.Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks[J].China communications magazine,2011,8(4):132-140.
Authors:Chen Xi    Tian Youliang  Li Xinghua  Ma Jianfeng
Affiliation:1Key Laboratory of Computer Networks and Information Security,Ministry of Education,Xidian University,Xi'an 710071,Shaanxi Province,P.R.China
2Networking Information Processing Laboratory,Rochester Institute of Technology,Rochester 14623,NY,United States
Abstract:In opportunistic Networks, compromised nodes can attack social context based routing protocols by publishing false social attributes information. To solve this problem, we propose a security scheme based on the identity based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self organized way without the need of any centralized authority. New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes. Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks. Simulation results show that: by implementing our security scheme, the network delivery probability of the social context based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.
Keywords:opportunistic networks  social context based routing  identity based signature  threshold cryptography
点击此处可从《中国通信学报》浏览原始摘要信息
点击此处可从《中国通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号