Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks
In opportunistic Networks, compromised nodes can attack social context-based routing pro-tocols by publishing false social attributes informa-tion. To solve this problem, we propose a security scheme based on the identity-based threshold sig-nature which allows mobile nodes to jointly gener-ate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority. New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes. Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks. Simulation results show that: by implementing our security scheme, the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportun-istic networks.
opportunistic networks social context-based routing identity-based signature threshold cryptography
Chen Xi Tian Youliang Li Xinghua Ma Jianfeng
Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian Universi Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian Universi Key Laboratory of Computer Networks and Information Security, Ministry of Education,Xidian Universit
国际会议
2011年中国计算机学会服务计算学术会议(CCF NCSC2011)
济南
英文
132-140
2011-08-18(万方平台首次上网日期,不代表论文的发表时间)