A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end c...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2013-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/469076 |
id |
doaj-cc35c14cf6734664b5bcc1e16d9d9619 |
---|---|
record_format |
Article |
spelling |
doaj-cc35c14cf6734664b5bcc1e16d9d96192020-11-25T03:17:10ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-04-01910.1155/2013/469076A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic NetworksFei Wang0YongJun Xu1Lin Wu2Longyijia Li3Dan Liu4Liehuang Zhu5 University of Chinese Academy of Sciences, Beijing 100049, China Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China University of Chinese Academy of Sciences, Beijing 100049, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSecurity is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance.https://doi.org/10.1155/2013/469076 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Fei Wang YongJun Xu Lin Wu Longyijia Li Dan Liu Liehuang Zhu |
spellingShingle |
Fei Wang YongJun Xu Lin Wu Longyijia Li Dan Liu Liehuang Zhu A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks International Journal of Distributed Sensor Networks |
author_facet |
Fei Wang YongJun Xu Lin Wu Longyijia Li Dan Liu Liehuang Zhu |
author_sort |
Fei Wang |
title |
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric
Opportunistic Networks |
title_short |
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric
Opportunistic Networks |
title_full |
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric
Opportunistic Networks |
title_fullStr |
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric
Opportunistic Networks |
title_full_unstemmed |
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric
Opportunistic Networks |
title_sort |
pefks- and cp-abe-based distributed security scheme in interest-centric
opportunistic networks |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2013-04-01 |
description |
Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance. |
url |
https://doi.org/10.1155/2013/469076 |
work_keys_str_mv |
AT feiwang apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT yongjunxu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT linwu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT longyijiali apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT danliu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT liehuangzhu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT feiwang pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT yongjunxu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT linwu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT longyijiali pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT danliu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks AT liehuangzhu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks |
_version_ |
1724633029978095616 |