会议专题

Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks

In opportunistic Networks, compromised nodes can attack social context-based routing pro-tocols by publishing false social attributes informa-tion. To solve this problem, we propose a security scheme based on the identity-based threshold sig-nature which allows mobile nodes to jointly gener-ate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority. New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes. Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks. Simulation results show that: by implementing our security scheme, the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportun-istic networks.

opportunistic networks social context-based routing identity-based signature threshold cryptography

Chen Xi Tian Youliang Li Xinghua Ma Jianfeng

Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian Universi Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian Universi Key Laboratory of Computer Networks and Information Security, Ministry of Education,Xidian Universit

国际会议

2011年中国计算机学会服务计算学术会议(CCF NCSC2011)

济南

英文

132-140

2011-08-18(万方平台首次上网日期,不代表论文的发表时间)