ARTÍCULO
TITULO

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

Samsul Huda    
Amang Sudarsono    
Tri Harsono    

Resumen

MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

 Artículos similares

       
 
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences

 
Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni    
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely m... ver más
Revista: Applied Sciences

 
Moody Alhanaya and Khalil Al-Shqeerat    
Internet of Things technology opens the horizon to a broader scope of intelligent applications in smart cities. However, the massive amount of traffic exchanged among devices may cause security risks, especially when devices are compromised or vulnerable... ver más
Revista: Applied Sciences

 
Nathan K. Long, Robert Malaney and Kenneth J. Grant    
Continuous-variable quantum key distribution (CV-QKD) shows potential for the rapid development of an information-theoretic secure global communication network; however, the complexities of CV-QKD implementation remain a restrictive factor. Machine learn... ver más
Revista: Information

 
Yunfa Li, Di Zhang, Zetian Wang and Guanxu Liu    
With the advancement of smart devices, the operation and communication of smart grids have become increasingly efficient. Many smart devices such as smart meters, smart transformers, and smart grid controllers are already widely used in smart grids. Thus... ver más
Revista: Applied Sciences