A Trustworthy Path Discovery Mechanism in Ubiquitous Networks

被引:1
|
作者
Geng Kui [1 ]
Li Fenghua [2 ,3 ]
Cao Jin [1 ]
Li Hui [1 ]
Chen Chen [1 ]
Zhang Cui [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Service models; Ubiquitous networks; Path discovery; Node discovery; Security; SECURE ROUTE DISCOVERY; NEIGHBOR DISCOVERY; PROTOCOL;
D O I
10.1049/cje.2016.03.018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the evolution of information communication technology, a large number of new applications appear, resulting in kinds of new accessing equipments to be deployed. Since the characteristics of randomness, dynamic and unpredictability of their positions, securely discovering these new equipments is one of a primary challenges to guarantee the security issues for these new applications. Traditional path discovery protocols cannot be directly borrowed and applied onto new service models due to the aforementioned inherent vulnerabilities. In this paper, we propose a Public key infrastructure-based (PKI-based) Trustworthy path discovery mechanism (TPDM), which is further implemented by trustworthy node discovery and neighbor node discovery protocols for new service models. As a result, a source node can discover a trustworthy path to the destination node and each intermediate node can also detect its neighbor nodes. Security analysis and evaluation results indicate the effectiveness and efficiency of our proposed mechanism.
引用
收藏
页码:312 / 319
页数:8
相关论文
共 50 条
  • [1] A Trustworthy Path Discovery Mechanism in Ubiquitous Networks
    GENG Kui
    LI Fenghua
    CAO Jin
    LI Hui
    CHEN Chen
    ZHANG Cui
    [J]. Chinese Journal of Electronics, 2016, 25 (02) : 312 - 319
  • [3] IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Preface
    Department of Computer Science, University of Nebraska, Omaha, United States
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    [J]. Proc. IEEE Int. Conf. Sensor Netw. Ubiquitous Trustworthy Comput., 2006, (xvii):
  • [4] The Most Trustworthy Path Selection in Online Social Networks
    Liu, Lianggui
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [5] Adaptive gateway discovery scheme for Mobile Ubiquitous Networks
    Xie, Fang
    Du, Lei
    Bai, Yong
    Chen, Lan
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2916 - 2920
  • [6] Compact data format for advertising and discovery in ubiquitous networks
    Poupyrev, Pavel
    Kawahara, Yoshihiro
    Davis, Peter
    Morikawa, Hiroyuki
    [J]. UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4836 : 274 - +
  • [7] Ubiquitous-trustworthy-secure data communication in hybrid cellular-Internet networks
    Talukder, AK
    Das, D
    Singh, B
    [J]. Proceedings of the IEEE INDICON 2004, 2004, : 135 - 138
  • [8] Shortest path discovery of complex networks
    Fekete, Attila
    Vattay, Gabor
    Posfai, Marton
    [J]. PHYSICAL REVIEW E, 2009, 79 (06)
  • [9] Resource Discovery and Share Mechanism In Disconnected Ubiquitous Stub Network
    Jiang, Yanfu
    Guo, Shaoyong
    Xu, Siya
    Qiu, Xuesong
    Meng, Luoming
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [10] A media access protocol for proactive information discovery in ubiquitous networks
    Poupyrev, Pavel
    Davis, Peter
    Morikawa, Hiroyuki
    Aoyama, Tomonori
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 276 - +