Font Size: a A A

Reasearch On Identity Authentication Schemes In Opportunistic Network

Posted on:2016-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y YinFull Text:PDF
GTID:2308330473965520Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless communication technology, mobile phone, tablet and laptop have become more and more popular. Ad hoc network has been used in civilian communications because of its flexibility, rapid, and needless of any infrastructure. However, in practical application scenarios, MANET and DTN network will be non-connected because of the node mobility, sparse, radiofrequency closed and signal attenuation caused by obstacles. To solve this problem, opportunistic networks emerged. Opportunistic network is a self-organized network which doesn’t need a complete link between the source node and the destination node. The nodes in opportunistic networks communicate with each other by the meet opportunities when they move around. The source node transmits the data to its destination node by hops with the unique ‘store-carry-forward’ routing mode, so the opportunistic networks have huge impact on pervasive computingAn identity authentication scheme in opportunistic network is proposed based on Fuzzy-IBE, which could conform to the characteristics of self-organized management, openness and intermittent connectivity in opportunistic networks. The scheme is committed to addressing the security issues such as privacy leaks in the existing social context-based routing protocols. Because of the intermittent connectivity, the traditional cryptography cannot apply to the opportunistic networks. So in F-ONIAS, an off-line PKG was used to generate private keys for users. Meanwhile, in identity-based cryptography, identity information may be forged. To avoid such security risks, the biological information was used as a node’s identifier. Simulation results show that implementing our security scheme does not induce any negative impact on the average delay, and achieves higher delivery probability and lower routing overhead rate.An identity authentication scheme for opportunistic network is proposed based on multidimensional scaling. The scheme provides a method to evaluate the trust relationship between nodes by calculating the relationship strength using the social context based on MDS, which is committed to addressing the security issues such as invalid certification issued by malicious nodes. Considering that there is no complete links between nodes in opportunistic network, M-CCIA establishes a trusted certificate network between nodes which implements the distributed identity authentication. Simulation results show that implementing our security scheme does not induce any negative impact on the average delay, and achieves higher delivery probability, detectable rate of malicious nodes and lower routing overhead rate.
Keywords/Search Tags:Opportunistic Network, Identity Authentication, Trust model, Fuzzy-IBE, Multidimensional Scaling
PDF Full Text Request
Related items