Abstract
Opportunistic Networks do not have a fundamental infrastructure, and different nodes in these networks have the role of a sender, receiver and a router. Intermediate nodes should route messages to neighbors and they should extract sufficient information for this purpose while the content of the message is still hidden. In order to achieve this aim, messages should be encrypted. While there is not a constant path between two specific nodes in OppNet, it is not possible to use traditional solutions such as a trusted third party for sharing the public key. In this paper, a new confidentiality structure is proposed in order to encrypt the messages and sharing nodes’ public key in Opportunistic Networks. By this new structure, intermediate nodes may route messages while they are not able to extract payload of a message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., McDonald, P.: When TCP breaks: delay-and disruption-tolerant networking. IEEE Internet Comput. 10(4), 72–78 (2006)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. ACM SIGARCH Comput. Archit. News 30(5), 96–107 (2002)
Huang, J.-H., Amjad, S., Mishra, S.: CenWits: a sensor-based loosely coupled search and rescue system using witnesses, pp. 180–191 (2005)
Detweiller, C., Vasilescu, I., Rus, D.: An underwater sensor network with dual communications, sensing, and mobility, pp. 1–6 (2007)
Shikfa, A., Onen, M., Molva, R.: Privacy in content-based opportunistic networks, pp. 832–837 (2009)
Shikfa, A., Önen, M., Molva, R.: Privacy in context-based and epidemic forwarding, pp. 1–7 (2009)
Hegland, A.M., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutor. 8(3), 48–66 (2006)
Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 100(12), 3172–3186 (2012)
Memarmoshrefi, P., Seibel, R., Hogrefe, D.: Autonomous ant-based public key authentication mechanism for mobile ad-hoc networks. Mob. Netw. Appl. 21(1), 149–160 (2016)
Le, Z., Vakde, G., Wright, M.: PEON: privacy-enhanced opportunistic networks with applications in assistive environments. In: 2nd International Conference on Pervasive Technologies Related to Assistive Environments, pp. 76–83 (2009)
Cabaniss, R., Kumar, V., Madria, S.: Multi-party encryption (MPE): secure communications in delay tolerant networks. Wirel. Netw. 21(4), 1243–1258 (2015)
Palmieri, P., Pouwelse, J.: Key management for onion routing in a true peer to peer setting. In: Yoshida, M., Mouri, K. (eds.) IWSEC 2014. LNCS, vol. 8639, pp. 62–71. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09843-2_5
Sakai, K., Sun, M.-T., Ku, W.-S., Wu, J., Alanazi, F.S.: Performance and security analyses of onion-based anonymous routing for delay tolerant networks. IEEE Trans. Mob. Comput. 16(12), 3473–3487 (2017)
de Diogo, A., Albini, L.C.P.: Fully distributed public key management through digital signature chains for delay and disrupt tolerant networks. In: 13th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 316–324 (2016)
Rashidibajgan, S.: A trust structure for detection of sybil attacks in opportunistic networks, pp. 347–351 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Rashidibajgan, S., Doss, R. (2018). A New Method for Sharing the Public Keys in Opportunistic Networks. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-94421-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94420-3
Online ISBN: 978-3-319-94421-0
eBook Packages: Computer ScienceComputer Science (R0)