A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end c...

Full description

Bibliographic Details
Main Authors: Fei Wang, YongJun Xu, Lin Wu, Longyijia Li, Dan Liu, Liehuang Zhu
Format: Article
Language:English
Published: SAGE Publishing 2013-04-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/469076
id doaj-cc35c14cf6734664b5bcc1e16d9d9619
record_format Article
spelling doaj-cc35c14cf6734664b5bcc1e16d9d96192020-11-25T03:17:10ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-04-01910.1155/2013/469076A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic NetworksFei Wang0YongJun Xu1Lin Wu2Longyijia Li3Dan Liu4Liehuang Zhu5 University of Chinese Academy of Sciences, Beijing 100049, China Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China University of Chinese Academy of Sciences, Beijing 100049, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, ChinaSecurity is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance.https://doi.org/10.1155/2013/469076
collection DOAJ
language English
format Article
sources DOAJ
author Fei Wang
YongJun Xu
Lin Wu
Longyijia Li
Dan Liu
Liehuang Zhu
spellingShingle Fei Wang
YongJun Xu
Lin Wu
Longyijia Li
Dan Liu
Liehuang Zhu
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
International Journal of Distributed Sensor Networks
author_facet Fei Wang
YongJun Xu
Lin Wu
Longyijia Li
Dan Liu
Liehuang Zhu
author_sort Fei Wang
title A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
title_short A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
title_full A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
title_fullStr A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
title_full_unstemmed A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
title_sort pefks- and cp-abe-based distributed security scheme in interest-centric opportunistic networks
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2013-04-01
description Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance.
url https://doi.org/10.1155/2013/469076
work_keys_str_mv AT feiwang apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT yongjunxu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT linwu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT longyijiali apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT danliu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT liehuangzhu apefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT feiwang pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT yongjunxu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT linwu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT longyijiali pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT danliu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
AT liehuangzhu pefksandcpabebaseddistributedsecurityschemeininterestcentricopportunisticnetworks
_version_ 1724633029978095616