机会网络中基于身份门限签名的可信路由(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:fongyu061440
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. In opportunistic Networks, compromised nodes can attack social context-based routing protocols by publishing false social attributes information. To solve this problem, we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority. New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes. Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks. Simulation results show that: by implementing our security scheme, the network delivery probability of the social context-based routing protocol can be effectively when there are large numbers of compromised nodes in opportunistic networks.
其他文献
针对传统细菌觅食优化算法(Bacterial Foraging Optimization,BFO)缺乏信息交流,容易陷入局部最优且收敛缓慢的缺点,将群体全面学习策略、趋化步长自适应更新机制嵌入到原始B
对胡萝卜吸附式低温干燥过程的干燥特性进行了试验研究.考察了干燥风的风温、风相对湿度、风速以及物料粒子体积对水分比的影响.并选择建立了数学模型.结果表明:提高风温、降
China’s COMPASS satellite navigation system consists of five or more geostationary (GEO) satellites.The roles of GEO satellites are to improve the regional use
本文介绍了液体连续相撞击流特性及其对动力学的影响,分析了撞击流性能与其连续相性质的关系,论述了液体连续相撞击流的特性,介绍了LIS促进动力学的实验结果。
在手机互联网直销背景下,根据鞅理论模型结合实际分别建立分散式决策和集中式决策的手机MTS供应链系统生产决策过程,分析了包含单个供应商和单个制造商的两级供应链系统,研究
本文研究了不同浓度的N,N-二乙基羟胺水溶液辐解产生的气态产物.结果表明:当N,N-二乙基羟胺的浓度为0.1-0.5mol/L,吸收剂量为10-1000kGy时,N,N-二乙基羟胺辐解产生的气态产物
基于技术相似度和研发两面性等理论,考察研发直接影响、溢出效应和吸收能力三种路径下,不同分位上和不同区制中研发对高技术产业产出增长的差异化驱动效应。结论认为,随着分
通过利用三种主流的跳跃检验识别方法,结合已实现异质自回归模型和基于已实现正负变差的思想,构建不同类型的高频波动率模型,以此评价不同跳跃检验的跳跃成分对波动率预测精
由于BOT(Build-Operate-Transfer)项目契约的不完全性特征,经营方在特许期内为了追求自身利益的最大化,会采取有损于项目整体效益的自利行为.通过案例分析,证明了经营方出于
本文以乙醇水溶液为提取溶剂,对从大豆胚芽中提取异黄酮的工艺参数进行了研究.以胚芽中总异黄酮提取率和提取的选择性为指标,确定的最适提取条件是:60%乙醇为提取溶剂,50℃提