Advanced Search
Volume 37 Issue 6
Jun.  2015
Turn off MathJax
Article Contents
Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
Citation: Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259

Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks

doi: 10.11999/JEIT141259
  • Received Date: 2014-09-26
  • Rev Recd Date: 2015-02-09
  • Publish Date: 2015-06-19
  • In the resource-constrained intermittent connectivity Ad-hoc networks, the wireless media is shared by collaborated nodes for message forwarding, and the confidentiality of messages is particularly vulnerable. To protect the confidentiality of the message content, a message forwarding mechanism for intermittent connectivity Ad-hoc networks is proposed. In this mechanism, the original message is sliced into several pieces to conceal the confidentiality, then taking advantage of the redundancy of message forwarding process from multi-copy routing and the node similarity, the forwarding paths of each piece are controlled to be disjoined. Consequently, the ferry nodes collect these pieces, verify their reliability, and restore to the original message, then encrypt it where only the destination node can decrypt the ciphertext. Finally, the confidentiality and integrity of messages in the forwarding process can be achieved. Numerical analysis shows that under the premise of network performance guaranty, the proposed mechanism can effectively protect the confidentiality of the message.
  • loading
  • Thrasyvoulos S, Rao N, Bin R, et al.. Routing for disruption tolerant networks: taxonomy and design[J]. Wireless Network, 2010, 8(16): 2349-2370.
    苏金树, 胡乔林, 赵宝康. 容延容断网络路由技术[J]. 软件学报, 2010, 21(1): 120-124.
    Su Jin-shu, Hu Qiao-lin, and Zhao Bao-kang. Routing techniques on delay/disruption tolerant networks[J]. Journal of Software, 2010, 21(1): 120-124.
    Anand D, Khemchandani V, and Sharma R K. Identity-based cryptography techniques and applications (a review)[C]. Proceedings of the 5th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 343-348.
    Guo L, Zhang C, Yue H, et al.. PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs[J]. IEEE Transactions on Mobile Computing, 2014, 13(12): 2903-2918.
    Jia Z, Lin X, Tan S H, et al.. Public key distribution scheme for delay tolerant networks based on two-channel cryptography[J]. Network and Computer Applications, 2012, 35(3): 905-913.
    Zhao W, Ammar M, and Zegura E. A message ferrying approach for data delivery in sparse mobile Ad Hoc networks[C]. Proceedings of the 5th International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2004: 187-198.
    Xue L, Liu J, and Peng J. An adaptive message ferry routing algorithm for delay tolerant networks[C]. Proceedings of the 14th International Conference on Communication Technology (ICCT), Chengdu, China, 2012: 699-703.
    Wang X, Chen M, Zhang G, et al.. HMFRS: a hierarchical multiple ferries routing scheme for clustered DTNs[C]. Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 2012: 1-4.
    Wang Y, Peng W, and Dou Q. Energy-constrained ferry route design for sparse wireless sensor networks[J]. Journal of Central South University, 2013, 20(11): 3142-3149.
    Fall K and Farrell S. DTN: an architectural retrospective[J]. IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828-836.
    Pardo J L G. Introduction to Cryptography with Maple[M]. Berlin Heidelberg: Springer, 2013: 131-179, 399-417.
    Sinha R, Srivastava H K, and Gupta S. Performance based comparison study of RSA and elliptic curve cryptography[J]. International Journal of Scientific Engineering Research, 2013, 4(5): 720-725.
    Pan H, Jon C, and Eiko Y. BUBBLE rap: social-based forwarding in delay tolerant networks[J]. IEEE Transactions on Mobile Computing, 2010, 10(11): 1576-1589.
    Ker?nen A, Ott J, and K?rkk?inen T. The ONE simulator for DTN protocol evaluation[C]. Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2009: 1-10.
    Zhou H, Chen J, Zhao H, et al.. On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks[J]. IEEE Transactions on Vehicular Technology, 2013, 62(9): 4629-4642.
    Gao H, Hu J, Wilson C, et al.. Detecting and characterizing social spam campaigns[C]. Proceedings of the 10th ACM SIGCOMN Conference on Internet Measurement, New York, USA, 2010: 35-47.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1810) PDF downloads(804) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return