[1]邓志龙.基于对称密码学针对上下文信息匹配的消息传输算法的安全策略[J].青岛远洋船员职业学院学报,2020,41(1):47-52.
 DENG Zhi-long.Improvement Research of Security Strategy in Message Transmission Algorithm in Opportunistic Networks[J].Journal of Qingdao Ocean Shipping Mariners College,2020,41(1):47-52.
点击复制

基于对称密码学针对上下文信息匹配的消息传输算法的安全策略()
分享到:

《青岛远洋船员职业学院学报》[ISSN:2095-3747/CN:37-1489/U]

卷:
41
期数:
2020年1期
页码:
47-52
栏目:
信息工程
出版日期:
2020-03-20

文章信息/Info

Title:
Improvement Research of Security Strategy in Message Transmission Algorithm in Opportunistic Networks
文章编号:
2095-3747(2020)-01-0047-06
作者:
邓志龙
南宁职业技术学院信息工程学院,广西 南宁530000
Author(s):
DENG Zhi-long
School of Information Engineering, Nanning College for Vocational and Technical, Nanning 530000,China
关键词:
机会网络上下文数据传输对称密码学可搜索加密算法
Keywords:
opportunistic networks context message transmission algorithm symmetric cryptographysearchable encryption algorithm
分类号:
TP393
文献标志码:
A
摘要:
为了加密保护在不影响机会网络消息传输算法自身传输效率的前提下上下文信息可能暴露在不可信任的机会网络节点环境中,提出了一种基于上下文信息的可搜索对称密码算法对数据传输进行加密。该算法将包含目的节点关键信息的关键字转换成为可搜索并可加密的消息头,将加密算法与信息数据的关键字优化配对,既能够向目的节点进行安全可靠的数据传输,亦可在数据传输过程中对其进行加密处理以保证其安全性。采用网络仿真工具ONE对该信任路由算法进行模拟实验,结果表明,利用对称密码学实施安全策略更符合机会网络节点特征,并且本文采用的安全策略并不
Abstract:
In order to encipherment protection context information in opportunistic networks of message transmission algorithm for the environment of distrust. We proposed a security strategy for message transmission based on searchable encryption algorithm of the context information. The algorithm can transform key words of destination node to searchable encryption message header, it will automatically match searchable encryption message header with keyword trapdoor, that can realize the transmission of a message, and don’t leak the context information. The results based on ONE simulator shows that security strategy for message transmission algorithm based on context information more consistent with characteristic of opportunistic network nodes, and it don’t affect the data delivery ratio and high message latency of the opportunistic network;Through analyzing benchmark of message transmission algorithm and comparing with other algorithms, we verifie d the excellent performance of the algorithm which bring forward success ratio and message latency into balance.

参考文献/References:

[1] S Stevens Negus, Jack Henningfield. Agonist Medications for the Treatment of Cocaine Use Disorder[J]. Neuropsychopharmacology, 2015,40(8):1815-1825.
[2] Batabyal Suvadip, Bhaumik Parama. Analysing social behaviour and message dissemination in human based delay tolerant network[J]. Wireless Networks, 2015,21(2):513-529.
[3] Ana Cristina Kochem Vendramin, Anelise Munaretto, Myriam Regattieri Delgado, et al. A social-aware routing protocol for opportunistic networks [J].2016,54(15):354-359.
[4] Caverlee J, Liu L, Webb S. The Social Trust framework for Trusted Social Information Management: Architecture and Algorithms [J]. Information Sciences, 2010, 180(1):95-112.
[5] Li Y, Gao Y, Li S, et al. Integrating forwarding and replication in DTN routing: a social network perspective. Proceedings of the 73rd Vehicular Technology Conference (VTC-Spring’11), 2011,5:15-18.
[6] Marti S, Giuli TJ, Lai K, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]. International Conference on Mobile Computing and Networking, Boston, MA, USA, 2000: 31—38.
[7]张蓓.带关键词检索公钥加密技术的研究与实现[D].广州:暨南大学.2010.
Zhang Bei. The Research and implement of public key encryption with keyword search schemes [J]. Guangzhou: Jinan university,2010.
[8] Yang L, Zhange Z, Pu L Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks [J]. International Journal of Digital Content Technology Its Applications, 2012, 6(22):640-647.
[9] Na L, Das SK. A Trust-based Framework for Data Forwarding in Opportunistic Networks[J]. Ad Hoc Networks, 2013, 11:1497-1509.
[10]胡予濮,张玉清,肖国镇.对称密码学[M].机械工业出版社,2002.
Hu Yupu, Zhang Yuqing, Xiao Guozhen. Symmetric cryptography[M]. China Machine PRESS,2002.
[11]刘阳.基于属性的加密体制研究[D].广州:中山大学.2009.
[12]姚显青. 基于真实地图数据的车辆机会网络仿真平台设计与实现[D].成都:电子科技大学, 2015.
Yao Xianqing. Design and implementation of vehicle opportunity network simulation platform based on real map data[D]. Cheng Du: University of Electronic Science and Technology, 2015.

备注/Memo

备注/Memo:
收稿日期:2019—12—26作者简介:邓志龙(1980.09-),男,硕士,副教授
更新日期/Last Update: 2020-03-20