An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption
Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous con...
Saved in:
Published in | 2014 Second International Symposium on Computing and Networking pp. 536 - 542 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 2379-1888 |
DOI | 10.1109/CANDAR.2014.34 |
Cover
Abstract | Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous connectivity. However, since the participating nodes are not fully trusted, the secure data exchange mechanism in the DTNs would be strongly desirable. In this paper, we propose an implementation of secure data exchange in the wireless DTNs using Attribute-Based Encryption (ABE) to provide two properties: (i) content data can be accessed by only authorized nodes that are dynamically defined by a policy on the attributes, and (ii) routing messages are attribute-based authenticated such that only the attribute-based authorized nodes can exchange the routing messages. |
---|---|
AbstractList | Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous connectivity. However, since the participating nodes are not fully trusted, the secure data exchange mechanism in the DTNs would be strongly desirable. In this paper, we propose an implementation of secure data exchange in the wireless DTNs using Attribute-Based Encryption (ABE) to provide two properties: (i) content data can be accessed by only authorized nodes that are dynamically defined by a policy on the attributes, and (ii) routing messages are attribute-based authenticated such that only the attribute-based authorized nodes can exchange the routing messages. |
Author | Sudarsono, Amang Nakanishi, Toru |
Author_xml | – sequence: 1 givenname: Amang surname: Sudarsono fullname: Sudarsono, Amang email: amang@pens.ac.id organization: Dept. of Electr. Eng., Electron. Eng. Polytech. Inst. of Surabaya (EEPIS), Surabaya, Indonesia – sequence: 2 givenname: Toru surname: Nakanishi fullname: Nakanishi, Toru email: t-nakanishi@hiroshima-u.ac.jp organization: Dept. of Inf. Eng., Hiroshima Univ., Higashi-Hiroshima, Japan |
BookMark | eNot0E9PwjAYgPGaYCIgVy9e3i8w7L-163ECKgnBRDEeSbe9YHXrSFuifHs1enpuv8MzIgPfeyTkitEpY9TczMr1vHyacsrkVMgzMmJSGyNZzvmADLnQJmNFUVyQSYzvlFLBqaRKDElXelh2hxY79Mkm13vod_CM9TEgzG2ysPiq36zfIzgPry5gizHCHFt7gk3fYrA-wRrTZx8-4CU6v4cypeCqY8Ls1kZsYOHrcDr82pfkfGfbiJP_jsnmbrGZPWSrx_vlrFxlTjCWMlkVWrOmUSi0zrUyomGKS86MlNbwqqplXmlUedMYaowqVG0ERVZpVWiUYkyu_1iHiNtDcJ0Np62mPzckF98HxlmI |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CANDAR.2014.34 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1479941522 9781479941520 |
EndPage | 542 |
ExternalDocumentID | 7052242 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i311t-4b8771dd6e37757693d162421944a92bbc45b7e65dd9099686c930e1b7687e43 |
IEDL.DBID | RIE |
ISSN | 2379-1888 |
IngestDate | Wed Aug 27 02:03:08 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i311t-4b8771dd6e37757693d162421944a92bbc45b7e65dd9099686c930e1b7687e43 |
PageCount | 7 |
ParticipantIDs | ieee_primary_7052242 |
PublicationCentury | 2000 |
PublicationDate | 2014-12 |
PublicationDateYYYYMMDD | 2014-12-01 |
PublicationDate_xml | – month: 12 year: 2014 text: 2014-12 |
PublicationDecade | 2010 |
PublicationTitle | 2014 Second International Symposium on Computing and Networking |
PublicationTitleAbbrev | candar |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003204063 ssj0001967840 |
Score | 1.604889 |
Snippet | Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 536 |
SubjectTerms | Ad hoc networks AES Attribute-Based Encryption Communication system security DTN Encryption MAC Routing Wireless communication |
Title | An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption |
URI | https://ieeexplore.ieee.org/document/7052242 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8MwGA5zJ09TN_GbHDzarmnSpjnWfTAEh8iE3UaTvIXh1snowPnrTdJuE_Hgre0pJG_frzzP-yB0HyuIolBzj1HXumGJlwipTM2Tx1rSKAHtUL7jePTGnqbRtIEe9lwYAHDgM_Dto7vL1yu1sa2yLg9MtsCMwz0yZlZxtQ79FGHcbj23xL7T0JinE1ILKRceMZVePbORBKLbS8f99NUiu5hvNZN_KKu4wDJsoefdkio8ybu_KaWvvn5Na_zvmk9Q50Dhwy_74HSKGlCcodZOwwHXv3QbLdMCuwnBy5qEVOBVjl0XHnA_KzM8-KzIwXheYIuVXRjfiPuwyLZ4slqAiXUlHldgcuwACDgtKxkt8B5NjNR4UKj11rmmDpoMB5PeyKslGLw5JaT0mEw4J1rHQDmPrG6iJpZRQgRjmQilVCySHOJIa2FyzTiJlaABEGmqGA6MnqNmsSrgAmGVERUDqCDJKAs0kznReR6KSGcZpzm7RG27ebOPasjGrN63q78_X6Nje3YVruQGNcv1Bm5NdlDKO2cW3zLOt1Q |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELUqGGDio0V844GRtHFsx_EY2qLyVSFUJLYqti8Sok0RSiXg12M7aYsQA1uSyXKce3eX9-4hdB5r4DwyImDUt25YEiRSaVvz5LFRlCdgPMt3GA-e2M0zf26gi6UWBgA8-Qza7tL_yzczPXetso4IbbbAbMBdt7jPeKXWWnVUpA289eQSd08je0C9lVpEhQyIrfXqqY0klJ1uOuylj47bxdrONfmHt4qHlqstdL9YVMUoeW3PS9XWX7_mNf531duotRLx4YclPO2gBhS7aGvh4oDrj7qJpmmB_YzgaS1DKvAsx74PD7iXlRnuf1TyYPxSYMeWndjoiHswyT7xaDYBi3YlHlZ0cuwpCDgtKyMtCC4tShrcL_T7pw9OLTS66o-6g6A2YQheKCFlwFQiBDEmBioEd86JhjhNCZGMZTJSSjOuBMTcGGmzzTiJtaQhEGXrGAGM7qG1YlbAPsI6IzoG0GGSURYapnJi8jyS3GSZoDk7QE23eeO3aszGuN63w78fn6GNwej-bnx3Pbw9QpvuPVYsk2O0Vr7P4cTmCqU69UfkG_tRuqE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Second+International+Symposium+on+Computing+and+Networking&rft.atitle=An+Implementation+of+Secure+Data+Exchange+in+Wireless+Delay+Tolerant+Network+Using+Attribute-Based+Encryption&rft.au=Sudarsono%2C+Amang&rft.au=Nakanishi%2C+Toru&rft.date=2014-12-01&rft.pub=IEEE&rft.issn=2379-1888&rft.spage=536&rft.epage=542&rft_id=info:doi/10.1109%2FCANDAR.2014.34&rft.externalDocID=7052242 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2379-1888&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2379-1888&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2379-1888&client=summon |