A New Method for Sharing the Public Keys in Opportunistic Networks

Opportunistic Networks do not have a fundamental infrastructure, and different nodes in these networks have the role of a sender, receiver and a router. Intermediate nodes should route messages to neighbors and they should extract sufficient information for this purpose while the content of the message is still hidden. In order to achieve this aim, messages should be encrypted. While there is not a constant path between two specific nodes in OppNet, it is not possible to use traditional solutions such as a trusted third party for sharing the public key. In this paper, a new confidentiality structure is proposed in order to encrypt the messages and sharing nodes’ public key in Opportunistic Networks. By this new structure, intermediate nodes may route messages while they are not able to extract payload of a message.

[1]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[2]  Jie Wu,et al.  Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks , 2017, IEEE Transactions on Mobile Computing.

[3]  D. Rus,et al.  An Underwater Sensor Network with Dual Communications, Sensing, and Mobility , 2007, OCEANS 2007 - Europe.

[4]  Shivakant Mishra,et al.  CenWits: a sensor-based loosely coupled search and rescue system using witnesses , 2005, SenSys '05.

[5]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[6]  Matthew K. Wright,et al.  PEON: privacy-enhanced opportunistic networks with applications in assistive environments , 2009, PETRA '09.

[7]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[8]  Dieter Hogrefe,et al.  Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks , 2016, Mob. Networks Appl..

[9]  Vinny Cahill,et al.  When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.

[10]  Sanjay Kumar Madria,et al.  Multi-party encryption (MPE): secure communications in delay tolerant networks , 2015, Wirel. Networks.

[11]  Luiz Carlos Pessoa Albini,et al.  Fully Distributed Public Key Management through Digital Signature Chains for Delay and Disrupt Tolerant Networks , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[12]  Samaneh Rashidibajgan A trust structure for detection of sybil attacks in opportunistic networks , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[13]  Johan A. Pouwelse,et al.  Key Management for Onion Routing in a True Peer to Peer Setting , 2014, IWSEC.

[14]  Refik Molva,et al.  Privacy in context-based and epidemic forwarding , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[15]  Refik Molva,et al.  Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.