Quality, Reliability, Security and Robustness in Heterogeneous Systems. 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22–23, 2019, Proceedings

Research Article

Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic Networks

Download
70 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-38819-5_16,
        author={Yang Qin and Tiantian Zhang and Mengya Li},
        title={Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic Networks},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22--23, 2019, Proceedings},
        proceedings_a={QSHINE},
        year={2020},
        month={1},
        keywords={Opportunistic network Routing Privacy protection Key management system},
        doi={10.1007/978-3-030-38819-5_16}
    }
    
  • Yang Qin
    Tiantian Zhang
    Mengya Li
    Year: 2020
    Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic Networks
    QSHINE
    Springer
    DOI: 10.1007/978-3-030-38819-5_16
Yang Qin1,*, Tiantian Zhang1,*, Mengya Li1,*
  • 1: Harbin Institute of Technology (Shenzhen)
*Contact email: csyqin@hit.edu.cn, 3344316263@qq.com, 1532732482@qq.com

Abstract

The opportunistic network adopts the disconnected store-and-forward architecture to provide communication support for the nodes without an infrastructure. As there is no stable communication link between the nodes, so that forwarding messages is via any encountered nodes. Social networks based on such opportunistic networks will have privacy challenges. In this paper, we propose a privacy protection scheme routing based on the utility value. We exploit the Bloom filter to obfuscate the friends lists and the corresponding utility values of nodes in order to make the routing decisions. This is easy to implement with high performance. Considering no infrastructure and stable link in opportunistic networks, this paper presents a self-organized key management system consisting of an identity authentication scheme based on the zero-knowledge proof of the elliptic curve and a key agreement scheme based on the threshold cryptography. The nodes prove their identities by themselves, and each node carries a certificate library to improve the authentication efficiency and success rate. In order to ensure the forward security and improve the session key agreement rate and the success rate, we exploit threshold cryptography to divide the session key, which could reduce the communication consumption of the traditional Diffie-Hellman (DH) algorithm. The experimental simulation results show that the proposed schemes are much better than the existing schemes for opportunistic networks.