Font Size: a A A

Research On Routing Security And Privacy Protection In Opportunistic Networks

Posted on:2019-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:T T ZhangFull Text:PDF
GTID:2428330566998532Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The rapid popularization and growth of smartphones in recent years has led to the development of many emerging technologies that are trying to capitalize on their growing processing power and storage space.One of the fastest growing technologies is the Opportunity Network.The opportunistic network is a kind of network that adopts the communication mode of "meet-store-forward" to provide communication support for the nodes without infrastructure.The nodes in the network are constantly moving and there is no stable communication link between the nodes.The encounter between the nodes and the assistance of the nodes for forwarding can serve as a complement to existing networks,increasing the utilization of existing networks and also applying to many other aspects.Due to its own characteristics,opportunistic networks have special requirements for privacy protection.For example,in probabilistic routing,the opportunistic network needs to rely on other encountered nodes for forwarding and needs to obtain the probability of the neighboring nodes reaching the destination node,which poses a problem of social privacy disclosure.In addition,due to the lack of infrastructure,traditional network security measures such as public key infrastructure PKI are not suitable for opportunistic networks.Therefore,a new key management system needs to be designed for identity authentication.In order to ensure the forward security of the message,Some Diffie-Hellman(DH)algorithms have more negotiation session key policies and are less efficient in opportunistic networks.Therefore,a new session key negotiation strategy needs to be designed.For the problem of privacy protection,the utility value of forwarding routing strategy based on the size,how to protect the utility value,effectively selects the next hop for the forwarding of the privacy protection problem,we proposed a privacy protection strategy based on bloom filter.Since opportunities for meeting opportunities in the opportunistic network can be fleeting,we need fast algorithms to make the most of each encounter.Simulation results show that the proposed scheme is better than other schemes,and is suitable for protecting the privacy of opportunistic network based on utility value forwarding.In addition,in order to achieve the goal of network security,this paper carried out a detailed design of the opportunistic network key management system.Due to the lack of basic facilities and non-central characteristics of opportunistic networks,this paper proposes a self-organized key management scheme based on an identity scheme with zero knowledge of elliptic curve.This scheme does not require basic infrastructure.The nodes prove to other nodes Know a secret yourself to prove their identity,while each node carries a certificate library to improve the certification efficiency and success rate.In order to ensure the forward security and speed up the session key negotiation rate and success rate,this paper uses threshold cryptography to encrypt the session key,thus reducing the traditional key agreement DH communication consumption,just take advantage of the opportunity network node mobile Features,only one-way transmission,can significantly reduce communication consumption.Theoretical analysis shows that the authentication strategy designed in this paper has better performance than the existing schemes and is more suitable for opportunistic networks.The experimental simulation of key negotiation shows that the proposed scheme is obviously better than the traditional DH scheme.
Keywords/Search Tags:opportunistic network, privacy protection, key management system
PDF Full Text Request
Related items