一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言?xún)?nèi)容
驗(yàn)證碼

消息內(nèi)容保護(hù)的間斷連接移動(dòng)自組織網(wǎng)絡(luò)轉(zhuǎn)發(fā)機(jī)制

吳大鵬 周之楠 張炎 王汝言

吳大鵬, 周之楠, 張炎, 王汝言. 消息內(nèi)容保護(hù)的間斷連接移動(dòng)自組織網(wǎng)絡(luò)轉(zhuǎn)發(fā)機(jī)制[J]. 電子與信息學(xué)報(bào), 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
引用本文: 吳大鵬, 周之楠, 張炎, 王汝言. 消息內(nèi)容保護(hù)的間斷連接移動(dòng)自組織網(wǎng)絡(luò)轉(zhuǎn)發(fā)機(jī)制[J]. 電子與信息學(xué)報(bào), 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259
Citation: Wu Da-peng, Zhou Zhi-nan, Zhang Yan, Wang Ru-yan. Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1271-1278. doi: 10.11999/JEIT141259

消息內(nèi)容保護(hù)的間斷連接移動(dòng)自組織網(wǎng)絡(luò)轉(zhuǎn)發(fā)機(jī)制

doi: 10.11999/JEIT141259
基金項(xiàng)目: 

國(guó)家自然科學(xué)基金(61371097),重慶市自然科學(xué)重點(diǎn)基金(CSTC2013JJB40001, CSTC2013JJB40006),重慶市自然科學(xué)基金(CSTC2011JJA40043, CSTC2014JCYJA40039),重慶市教委項(xiàng)目(KJ1400402),重慶市青年科技人才培養(yǎng)計(jì)劃(CSTC2014kJRC- QNRC40001)和重郵青年自然科學(xué)基金(A2012-93)資助課題

Message Content Protected Forwarding Mechanism for Intermittent Connectivity Ad-hoc Networks

  • 摘要: 移動(dòng)自組織網(wǎng)絡(luò)資源有限,且節(jié)點(diǎn)之間共享無(wú)線(xiàn)信道并以協(xié)作的方式完成消息轉(zhuǎn)發(fā),導(dǎo)致所傳輸消息的機(jī)密性較為脆弱。為保護(hù)消息內(nèi)容的機(jī)密性,該文提出一種間斷連接移動(dòng)自組織網(wǎng)絡(luò)中的消息轉(zhuǎn)發(fā)機(jī)制。各節(jié)點(diǎn)對(duì)原始消息進(jìn)行切割,并利用多副本消息轉(zhuǎn)發(fā)過(guò)程的冗余性和節(jié)點(diǎn)相似性控制各片段消息在不相交的路徑上進(jìn)行轉(zhuǎn)發(fā),進(jìn)而由網(wǎng)絡(luò)中的擺渡節(jié)點(diǎn)收集、檢驗(yàn)并還原、加密得到僅目的節(jié)點(diǎn)能夠解密的完整消息,確保轉(zhuǎn)發(fā)過(guò)程中消息的機(jī)密性、完整性。數(shù)值分析表明所提機(jī)制在保障網(wǎng)絡(luò)性能前提下,能有效保護(hù)消息的機(jī)密性。
  • Thrasyvoulos S, Rao N, Bin R, et al.. Routing for disruption tolerant networks: taxonomy and design[J]. Wireless Network, 2010, 8(16): 2349-2370.
    蘇金樹(shù), 胡喬林, 趙寶康. 容延容斷網(wǎng)絡(luò)路由技術(shù)[J]. 軟件學(xué)報(bào), 2010, 21(1): 120-124.
    Su Jin-shu, Hu Qiao-lin, and Zhao Bao-kang. Routing techniques on delay/disruption tolerant networks[J]. Journal of Software, 2010, 21(1): 120-124.
    Anand D, Khemchandani V, and Sharma R K. Identity-based cryptography techniques and applications (a review)[C]. Proceedings of the 5th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 343-348.
    Guo L, Zhang C, Yue H, et al.. PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs[J]. IEEE Transactions on Mobile Computing, 2014, 13(12): 2903-2918.
    Jia Z, Lin X, Tan S H, et al.. Public key distribution scheme for delay tolerant networks based on two-channel cryptography[J]. Network and Computer Applications, 2012, 35(3): 905-913.
    Zhao W, Ammar M, and Zegura E. A message ferrying approach for data delivery in sparse mobile Ad Hoc networks[C]. Proceedings of the 5th International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2004: 187-198.
    Xue L, Liu J, and Peng J. An adaptive message ferry routing algorithm for delay tolerant networks[C]. Proceedings of the 14th International Conference on Communication Technology (ICCT), Chengdu, China, 2012: 699-703.
    Wang X, Chen M, Zhang G, et al.. HMFRS: a hierarchical multiple ferries routing scheme for clustered DTNs[C]. Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 2012: 1-4.
    Wang Y, Peng W, and Dou Q. Energy-constrained ferry route design for sparse wireless sensor networks[J]. Journal of Central South University, 2013, 20(11): 3142-3149.
    Fall K and Farrell S. DTN: an architectural retrospective[J]. IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828-836.
    Pardo J L G. Introduction to Cryptography with Maple[M]. Berlin Heidelberg: Springer, 2013: 131-179, 399-417.
    Sinha R, Srivastava H K, and Gupta S. Performance based comparison study of RSA and elliptic curve cryptography[J]. International Journal of Scientific Engineering Research, 2013, 4(5): 720-725.
    Pan H, Jon C, and Eiko Y. BUBBLE rap: social-based forwarding in delay tolerant networks[J]. IEEE Transactions on Mobile Computing, 2010, 10(11): 1576-1589.
    Ker?nen A, Ott J, and K?rkk?inen T. The ONE simulator for DTN protocol evaluation[C]. Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2009: 1-10.
    Zhou H, Chen J, Zhao H, et al.. On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks[J]. IEEE Transactions on Vehicular Technology, 2013, 62(9): 4629-4642.
    Gao H, Hu J, Wilson C, et al.. Detecting and characterizing social spam campaigns[C]. Proceedings of the 10th ACM SIGCOMN Conference on Internet Measurement, New York, USA, 2010: 35-47.
  • 加載中
計(jì)量
  • 文章訪(fǎng)問(wèn)數(shù):  1829
  • HTML全文瀏覽量:  113
  • PDF下載量:  804
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-09-26
  • 修回日期:  2015-02-09
  • 刊出日期:  2015-06-19

目錄

    /

    返回文章
    返回