首页> 外文会议>International conference on advances in computing, communications and informatics >A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network
【24h】

A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network

机译:使用对等延迟容忍网络安全分发灾后情况数据的基于组的多层加密方案

获取原文

摘要

In the event of a disaster, the communication infrastructure can be partially or totally destroyed, or rendered unavailable due to high congestion. Today's smart-phones that can communicate directly via Bluetooth or WiFi without using any network infrastructure, can be used to create an opportunistic post disaster communication network where situational data can spread quickly, even in the harshest conditions. However, presence of malicious and unscrupulous entities that forward sensitive situational data in such a network may pose serious threats on accuracy and timeliness of the data. Therefore, providing basic security features, like authentication, confidentiality and integrity, to all communications occurring in this network becomes inevitable. But, in such an opportunistic network, that uses short range and sporadic wireless connections, no trusted third party can be used as it won't be accessible locally at the runtime. As a result, traditional security services like cryptographic signatures, certificates, authentication protocols and end-to-end encryption become inapplicable. Moreover, since disaster management is generally a group based activity; a forwarding entity may be better authenticated based on its group membership verification. In this paper, we propose a Group-based Distributed Authentication Mechanism that enables nodes to mutually authenticate each other as members of valid groups and also suggest a Multilayer Hashed Encryption Scheme in which rescue-groups collaboratively contribute towards preserving the confidentiality and integrity of sensitive situational information. The schemes provide authentication, confidentiality and integrity in a fully decentralized manner to suit the requirements of an opportunistic post disaster communication network. We emulate a post disaster scenario in the ONE simulator to show the effectiveness of our schemes in terms of delivery ratio, average delay and overhead ratio.
机译:在发生灾难的情况下,由于高度拥挤,通信基础设施可能会部分或全部毁坏,或变得不可用。当今的智能电话可以通过蓝牙或WiFi直接通信,而无需使用任何网络基础结构,可以用来建立机会主义的灾后通信网络,即使在最恶劣的条件下,情况数据也可以迅速传播。但是,在这种网络中存在转发敏感情况数据的恶意和不道德实体可能会对数据的准确性和及时性造成严重威胁。因此,为该网络中发生的所有通信提供基本的安全功能(如身份验证,机密性和完整性)变得不可避免。但是,在这种使用短距离和零星无线连接的机会网络中,无法使用受信任的第三方,因为在运行时本地无法访问它。结果,诸如加密签名,证书,身份验证协议和端到端加密之类的传统安全服务变得不适用。此外,由于灾难管理通常是基于团体的活动,因此,基于转发实体的组成员身份验证,可以更好地对转发实体进行身份验证。在本文中,我们提出了一种基于组的分布式身份验证机制,该机制使节点能够相互作为有效组的成员进行相互身份验证,并且提出了一种多层哈希加密方案,在该方案中,救援组可以协同工作,以保护敏感情况的机密性和完整性。信息。这些方案以完全分散的方式提供身份验证,机密性和完整性,以适应机会主义的灾后通信网络的需求。我们在ONE模拟器中模拟灾难后场景,以显示我们的方案在交付率,平均延迟和开销率方面的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号