期刊文献+

基于不经意传输的拓扑隐藏广播协议设计

Design of a Topology-hiding Broadcast Protocol Based on Oblivious Transfer
下载PDF
导出
摘要 为了保护消息广播中节点关系、地理位置等敏感信息,将高效的NTRU(Number Theory Research Unit)公钥加密算法与不经意传输协议相结合,通过引入不可信的第三方以保证广播的中间过程无法被任意节点所获知,从而实现了隐藏网络拓扑结构的目标。该协议可认为是拓扑隐藏广播的具体实现,解决了现有概念性方案中尚未涉及的秘钥重构、相邻节点身份隐藏及网络动态变化等问题。安全性分析表明,在半诚实攻击模型下该方案能够保证网络中任何一部分节点被攻破均不会导致其他节点拓扑信息泄露。此外,通过与相关概念性协议进行实验对比分析,该方案除安全性外还可充分体现计算、通信开销与节点平均度数无关的优势。 In order to protect sensitive information such as node relationship and geographical position, an efficient public key cryptosystem named NTRU (Number Theory Research Unit) is introduced into oblivious transfer protocol and an untrusted third party is used to hide the intermediate process of broadcasting for the sake of topological privacy. The protocol can be considered as the implementation of topology hiding broadcast, and it addresses some uncovered problems of its previous conceptual schemes such as key reconstruction, confidentiality of IDs within neighboring nodes as well as nodes network dynamicity. Security and performance analysis indicates that the proposed protocol endures topology concealment as long as any part of the network is corrupted, and manifests its merits of low computation and communication overheads as well as the advantage of independence on node degree.
出处 《电讯技术》 北大核心 2017年第2期173-179,共7页 Telecommunication Engineering
基金 重庆市教委科学技术研究项目(JK1705139)
关键词 多方安全计算 拓扑隐藏 NTRU 不经意传输 广播协议设计 secure multi - party computation ( SMC ) topologyhiding number theory research unit ( NT- RU) oblivious transfer broadcast protocol design
  • 相关文献

参考文献3

二级参考文献43

  • 1Latre B, Braem B, Moerman I, et al. A Survey on Wireless Body Area Networks [ J 1. Wireless Networks, 2011,17 (1) :1-18.
  • 2Poon C C Y,Zhang Y T, Bao S D. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m - health [ J ]. IEEE Communications Magazine,2006,44(4) : 73-81.
  • 3Ramli S N, Ahmad R, Abdollah M F, et al. A biometric- based security for data authentication in wireless body ar- ea network (WBAN) [ C ]//Proceedings of 15th Interna- tional Conference on Advanced Communication Technolo- gy. Pyeongchang, Korea : IEEE ,2013 : 998-1001.
  • 4Latre B, De Poorter E, Moerman I, et al. MOFBAN: A lightweight modular framework for body area networks [ M ]//Embedded and Ubiquitous Computing. Berlin: Springer Berlin Heidelberg,2007 : 610-622.
  • 5Tan C C,Wang H,Zhong S,et al. IBE-lite: a lightweight identity- based cryptography for body sensor networks [ ~ 1. IEEE Transactions on Information Technology in Bi- omedicine,2009,13 (6) : 926-932.
  • 6Jang C S, Lee D G, Han 1, et al. Hybrid security protocol for wireless body area networks [ J ]. Wireless Communica- tions and Mobile Computing,2011,11 (2) : 277-288.
  • 7Mare S, Sorber J, Shin M, et al. Adaptive security and pri- vacy for mHealth sensing [ C ]//Proceedings of the 2nd USENIX Workshop on Health Security and Privacy. Berkeley, CA, USA : IEEE ,2011 : 1-5.
  • 8Ahlswede R, Cai N, Li S Y R, et al. Network information flow[ J ]. IEEE Transactions on Information Theory,2000, 46(4) : 1204-1216.
  • 9Arrobo G A, Gitlin R D. Improving the Reliability of Wireless Body Area Networks[ C] //Proceedings of 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Boston, MA: IEEE, 2011 : 2192-2195.
  • 10Tracey H,Medard M,Koetter R,et al. A random linear net- work coding approach to multicast [ J ]. IEEE Transactions on Information Theory,2006,52(10) :4413-4430.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部