GENG Kui, LI Fenghua, CAO Jin, LI Hui, CHEN Chen, ZHANG Cui. A Trustworthy Path Discovery Mechanism in Ubiquitous Networks[J]. Chinese Journal of Electronics, 2016, 25(2): 312-319. doi: 10.1049/cje.2016.03.018
Citation: GENG Kui, LI Fenghua, CAO Jin, LI Hui, CHEN Chen, ZHANG Cui. A Trustworthy Path Discovery Mechanism in Ubiquitous Networks[J]. Chinese Journal of Electronics, 2016, 25(2): 312-319. doi: 10.1049/cje.2016.03.018

A Trustworthy Path Discovery Mechanism in Ubiquitous Networks

doi: 10.1049/cje.2016.03.018
Funds:  This work is supported by the National Natural Science Foundation of China (No.61170251), the National High Technology Research and Development Program of China (863 Program)(No.2012AA013102), and the Key Program of Scientific and Technology Research of Ministry of Education (No.209156).
More Information
  • Corresponding author: LI Fenghua (corresponding author) received the B.S., M.S. and Ph.D. degrees in computer software and computer systems architecture from Xidian University in 1987, 1990 and 2009, respectively. Currently, he is working as professor and doctoral supervisor in State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences. And he is also a doctoral supervisor of Xidian University. His current research interests include network security, system security & evaluation and trusted computation. (Email:lfh@iie.ac.cn)
  • Received Date: 2015-07-06
  • Rev Recd Date: 2015-08-07
  • Publish Date: 2016-03-10
  • With the evolution of information communication technology, a large number of new applications appear, resulting in kinds of new accessing equipments to be deployed. Since the characteristics of randomness, dynamic and unpredictability of their positions, securely discovering these new equipments is one of a primary challenges to guarantee the security issues for these new applications. Traditional path discovery protocols cannot be directly borrowed and applied onto new service models due to the aforementioned inherent vulnerabilities. In this paper, we propose a Public key infrastructure-based (PKIbased) Trustworthy path discovery mechanism (TPDM), which is further implemented by trustworthy node discovery and neighbor node discovery protocols for new service models. As a result, a source node can discover a trustworthy path to the destination node and each intermediate node can also detect its neighbor nodes. Security analysis and evaluation results indicate the effectiveness and efficiency of our proposed mechanism.
  • loading
  • D. Johnson, Y. Hu and D. Maltz, "The dynamic source routing protocol (DSR) for mobile ad hoc networks for ipv4", RFC 4728, IETF: The Internet Engineering Taskforce, 2007.
    J.S. Choi, "A hybrid topology discovery protocol for mobile backhaul", Proc. of IEEE CNS 2013, San Diego, CA, USA, pp. 15:1-15:4, 2013.
    S. Vasudevan, M. Adler, D. Goeckel, et al. "Efficient algorithms for neighbor discovery in wireless networks", IEEE/ACM Trans. Netw., Vol.21, No.1, pp. 69-83, 2013.
    F. Valentini, M. Pratesi, F. Santucci, et al. "Ipv4 and ipv6 troubleshooting enhancement through reverse path discovery", Proc. of IEEE NOMS 2014, Karkow, Poland, pp.1-4, 2014.
    I. Avramopoulos, H. Kobayashi, R. Wang, et al. "Highly secure and efficient routing", Proc. of IEEE INFOCOM 2004, Hong Kong, China, pp.197-208, 2004.
    Y.-C. Hu, A. Perrig and D.B. Johnson, "Ariadne: A secure ondemand routing protocol for ad hoc networks", Wireless Networks, Vol.11, No.1-2, pp.21-38, 2005.
    K.A. Sivakumar and M. Ramkumar, "An efficient secure route discovery protocol for dsr", Proc. of IEEE GLOBECOM 2007, Washington, D.C., USA, pp.458-463, 2007.
    C. Chandra and V. Singh, "Advance dynamic source routing (ADSR) for multi hop ad hoc network and performance evaluation of proactive and reactive protocols", Proc. of ACM ICONIAAC 2014, Amritapuri, India, pp.24:1-24:6, 2014.
    K. Liu, J. Deng, P. K. Varshney, et al. "An acknowledgmentbased approach for the detection of routing misbehavior in manets", IEEE Transactions on Mobile Computing, Vol.6, No.5, pp.536-550, 2007.
    M. Burmester and B. de Medeiros, "On the security of route discovery in manets", IEEE Transactions on Mobile Computing, Vol.8, No.9, pp.1180-1188, 2009.
    J. Kim and G. Tsudik, "Srdp: Secure route discovery for dynamic source routing in manets", Ad Hoc Networks, Vol.7, No.6, pp.1097-1109, 2009.
    J. Naous, M. Walfish, A. Nicolosi, et al. "Verifying and enforcing network paths with icing", Proc. of the ACM CoNEXT 2011, Tokyo, Japan, pp.30:1-30:12, 2011.
    H. Bakhsh, N. Zhang and A. Carpenter, "Tadl: A trust-aware dynamic location-based protocol suite for discovering multiple paths in manets", Proc. of ACM ICDCN 2015, Goa, India, pp.2:1-2:10, 2015.
    X. Wu, S. Liu, H. Zhu, et al. "Modeling and verifying the ariadne protocol using csp", Proc. of IEEE ECBS 2012, Novi Sad, Serbia, pp.24-32, 2012.
    M. Poturalski, P. Papadimitratos and J.-P. Hubaux, "Formal analysis of secure neighbor discovery in wireless networks", IEEE Transactions on Dependable and Secure Computing, Vol.10, No.6, pp.355-367, 2013.
    L. Chen, K. Bian and M. Zheng, "Heterogeneous multi-channel neighbor discovery formobile sensing applications: Theoretical foundationand protocol design", Proc. of ACM MobiHoc 2014, Philadelphia, PA, USA, pp.307-316, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (194) PDF downloads(652) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return