高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

消息内容保护的间断连接移动自组织网络转发机制

吴大鹏 周之楠 张炎 王汝言

吴大鹏, 周之楠, 张炎, 王汝言. 消息内容保护的间断连接移动自组织网络转发机制[J]. 电子与信息学报, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
引用本文: 吴大鹏, 周之楠, 张炎, 王汝言. 消息内容保护的间断连接移动自组织网络转发机制[J]. 电子与信息学报, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
Citation: Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259

消息内容保护的间断连接移动自组织网络转发机制

doi: 10.11999/JEIT141259
基金项目: 

国家自然科学基金(61371097),重庆市自然科学重点基金(CSTC2013JJB40001, CSTC2013JJB40006),重庆市自然科学基金(CSTC2011JJA40043, CSTC2014JCYJA40039),重庆市教委项目(KJ1400402),重庆市青年科技人才培养计划(CSTC2014kJRC- QNRC40001)和重邮青年自然科学基金(A2012-93)资助课题

Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks

  • 摘要: 移动自组织网络资源有限,且节点之间共享无线信道并以协作的方式完成消息转发,导致所传输消息的机密性较为脆弱。为保护消息内容的机密性,该文提出一种间断连接移动自组织网络中的消息转发机制。各节点对原始消息进行切割,并利用多副本消息转发过程的冗余性和节点相似性控制各片段消息在不相交的路径上进行转发,进而由网络中的摆渡节点收集、检验并还原、加密得到仅目的节点能够解密的完整消息,确保转发过程中消息的机密性、完整性。数值分析表明所提机制在保障网络性能前提下,能有效保护消息的机密性。
  • Thrasyvoulos S, Rao N, Bin R, et al.. Routing for disruption tolerant networks: taxonomy and design[J]. Wireless Network, 2010, 8(16): 2349-2370.
    苏金树, 胡乔林, 赵宝康. 容延容断网络路由技术[J]. 软件学报, 2010, 21(1): 120-124.
    Su Jin-shu, Hu Qiao-lin, and Zhao Bao-kang. Routing techniques on delay/disruption tolerant networks[J]. Journal of Software, 2010, 21(1): 120-124.
    Anand D, Khemchandani V, and Sharma R K. Identity-based cryptography techniques and applications (a review)[C]. Proceedings of the 5th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 343-348.
    Guo L, Zhang C, Yue H, et al.. PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs[J]. IEEE Transactions on Mobile Computing, 2014, 13(12): 2903-2918.
    Jia Z, Lin X, Tan S H, et al.. Public key distribution scheme for delay tolerant networks based on two-channel cryptography[J]. Network and Computer Applications, 2012, 35(3): 905-913.
    Zhao W, Ammar M, and Zegura E. A message ferrying approach for data delivery in sparse mobile Ad Hoc networks[C]. Proceedings of the 5th International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2004: 187-198.
    Xue L, Liu J, and Peng J. An adaptive message ferry routing algorithm for delay tolerant networks[C]. Proceedings of the 14th International Conference on Communication Technology (ICCT), Chengdu, China, 2012: 699-703.
    Wang X, Chen M, Zhang G, et al.. HMFRS: a hierarchical multiple ferries routing scheme for clustered DTNs[C]. Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 2012: 1-4.
    Wang Y, Peng W, and Dou Q. Energy-constrained ferry route design for sparse wireless sensor networks[J]. Journal of Central South University, 2013, 20(11): 3142-3149.
    Fall K and Farrell S. DTN: an architectural retrospective[J]. IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828-836.
    Pardo J L G. Introduction to Cryptography with Maple[M]. Berlin Heidelberg: Springer, 2013: 131-179, 399-417.
    Sinha R, Srivastava H K, and Gupta S. Performance based comparison study of RSA and elliptic curve cryptography[J]. International Journal of Scientific Engineering Research, 2013, 4(5): 720-725.
    Pan H, Jon C, and Eiko Y. BUBBLE rap: social-based forwarding in delay tolerant networks[J]. IEEE Transactions on Mobile Computing, 2010, 10(11): 1576-1589.
    Ker?nen A, Ott J, and K?rkk?inen T. The ONE simulator for DTN protocol evaluation[C]. Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2009: 1-10.
    Zhou H, Chen J, Zhao H, et al.. On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks[J]. IEEE Transactions on Vehicular Technology, 2013, 62(9): 4629-4642.
    Gao H, Hu J, Wilson C, et al.. Detecting and characterizing social spam campaigns[C]. Proceedings of the 10th ACM SIGCOMN Conference on Internet Measurement, New York, USA, 2010: 35-47.
  • 加载中
计量
  • 文章访问数:  1818
  • HTML全文浏览量:  112
  • PDF下载量:  804
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-09-26
  • 修回日期:  2015-02-09
  • 刊出日期:  2015-06-19

目录

    /

    返回文章
    返回