CN103297962B - A kind of opportunistic network routing method based on encryption fuzzy keyword and system - Google Patents
A kind of opportunistic network routing method based on encryption fuzzy keyword and system Download PDFInfo
- Publication number
- CN103297962B CN103297962B CN201310153333.3A CN201310153333A CN103297962B CN 103297962 B CN103297962 B CN 103297962B CN 201310153333 A CN201310153333 A CN 201310153333A CN 103297962 B CN103297962 B CN 103297962B
- Authority
- CN
- China
- Prior art keywords
- interest
- keyword
- fuzzy
- node
- opportunistic network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a kind of opportunistic network routing method based on encryption fuzzy keyword and system, method comprises: step 1, calculates fuzzy set and trapdoor collection that in described subscription interest set of keywords, each interest keyword is corresponding; Step 2, calculates the similarity between any two trapdoor collection by similarity mode algorithm; Step 3, publisher node utilizes trusted third party to calculate the search key set that in described issue interest set of keywords, each interest keyword is corresponding according to the issue interest set of keywords of its content distributed extraction, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node; Step 4, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, sets up routing table.
Description
Technical field
The present invention relates to the information security technology in information science field wireless communication, particularly relate to a kind of opportunistic network routing method based on encryption fuzzy keyword and system.
Background technology
Opportunistic network has the general characteristic of delay-tolerant network, and the chance of meeting utilizing node motion to bring realizes the self-organizing network of communication, its target be in order to solve frequent between data communication problem in circuit network.In opportunistic network, have several obvious feature: 1. cannot obtain routing iinformation from end-to-end link, the information that intermediate node will obtain according to oneself carries out routing decision.2. do not have clear and definite target, target normally meets the node of a certain feature, may be belong to some regions, also may be to complete same function, may be also interested in certain customizing messages.3. need the information utilizing various different communication system different levels, this just makes the application message in opportunistic network, the network information etc. all be retracted to same level, defines flat network configuration.Along with the universal of the communication equipments such as mobile phone, panel computer, notebook computer and development, opportunistic network develops rapidly in application demand.
Content-based opportunistic network is a kind of opportunistic network deciding route according to the content of message, routing iinformation is used as with message content, being in fact with the interest of user in opportunistic network to drive the communication of opportunistic network, so more precisely, is the opportunistic network centered by interest.Relative to based on the opportunistic network copied, the opportunistic network built based on social context or message content is more adapted to promotion and application in people's daily life, but in opportunistic network content-based at present research, the work of forefathers mostly builds routing forwarding message based on clear and definite inquiry or index, this can cause such a case, when user to be concerned about content only have little knowledge and have to the solution taking to try time, after submitting to complete inquiry to obtain content, they can think that they are kept in the dark, reduce the user interactivity of opportunistic network.
In addition, privacy protecting is a very severe problem in content-based opportunistic network.In opportunistic network focusing on people, the forwarding of message needs to build route by the content of pass-along message, no matter be the forwarding that the broadcast of recipient's interest and the issue of publisher's content all need to be turned by one or more difference originator, although be user equally, turn originator and be not received person and publisher trusted.So node wishes that the message that can send oneself carries out strict access control, recipient is when carrying out the broadcast of interest, do not wish other recipient, interest that intermediate node knows oneself, and publisher is when carrying out the issue of content, do not wish that the recipient outside other publisher, intermediate node and oneself appointment knows that oneself content distributed interest leads yet.Thus, in content-based opportunistic network, the forwarding how carrying out route when not revealing user privacy information becomes the severe problem of of containing opportunistic network development.
Cryptography key word search be a kind of technology of high in the clouds enciphered data being carried out to keyword search occurred along with cloud Development of storage technology, domestic and international expert has carried out extensive research to it, this wherein, the encryption retrieval technique achievement based on symmetric key encryption is remarkable.But in opportunistic network, the message of sender user's issue, towards being one group of recipient user, also needs between multiple publisher user to maintain secrecy mutually, as the same between multiple recipient user.Thus more applicable based on asymmetric-key encryption search technique.The thought of the key search technology in enciphered data mainly contains two kinds based on the searching algorithm of homomorphic cryptography and the searching algorithm based on trapdoor technology.Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Carry out process to the data through homomorphic cryptography and obtain an output, this output be decrypted, its result is the same with the Output rusults obtained by Same Way process unencrypted initial data.Searching algorithm based on trapdoor technology is based on the key search function in the enciphered data of trapdoor thought realization.Trap-door one-way function is the special one-way function of a class having a trapdoor.First it is an one-way function, is easy in one direction calculate and be difficult in the other direction calculate.But, if obtain that secret trapdoor, then also can be easy at this function of another direction calculating.The effect of trapdoor is similar to the private key in asymmetric-key encryption technology, and trapdoor function is just equivalent to cryptographic algorithm.
Summary of the invention
The invention provides a kind of opportunistic network routing method based on encryption fuzzy keyword and system; in order to protect privacy of user; the expansion of the search of efficient fuzzy interest and opportunistic network applied environment is provided; tolerance is intermittent to be connected; therefore the present invention can allow user to issue encryption fuzzy interest keyword in opportunistic network; improve the efficiency of opportunistic network in content is shared and flexibility, and can allow to turn originator and realize opportunistic network routing procedure by the search of publisher being encrypted to fuzzy interest keyword.
For achieving the above object, the invention provides a kind of opportunistic network routing method based on encryption fuzzy keyword, the method comprises:
Step 1, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, calculate trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to subscription node;
Step 2, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Step 4, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table and carries out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculate the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, then carry out routing decision according to described result of calculation.
Further, described step 1 comprises:
Step 11, at the initial phase that described opportunistic network is disposed, determines this opportunistic network
In all legal keyword composition dictionary that relates to;
Step 12, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set.
Step 13, calculates its trapdoor for each fuzzy keyword in described fuzzy set, forms the trapdoor collection for each fuzzy keyword.
Subscription interest set of keywords in wherein said step 1 is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
Routing table in described step 4 is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
For achieving the above object, the present invention also provides a kind of opportunistic network route system based on encryption fuzzy keyword, and this system comprises:
Interest processing module, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, calculate trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to subscription node;
Subscribe to processing module, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Route processing module, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table, and is carried out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculate the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, then carry out routing decision according to described result of calculation.。
Further, described interest processing module comprises:
Initial processing module, at the initial phase that described opportunistic network is disposed, determines all legal keyword composition dictionary related in this opportunistic network;
Fuzzy Processing module, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set.
Trapdoor collection obtains module, calculates its trapdoor, form the trapdoor collection for each fuzzy keyword for each fuzzy keyword in described fuzzy set.
Subscription interest set of keywords in wherein said interest processing module is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
Routing table in wherein said route processing module is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
Beneficial functional of the present invention is:
1. the introducing of fuzzy keyword support, keyword limited amount when carrying out routing decision based on accurate keyword in chance networking before can solving on the one hand, user's blindness are large, single etc. the limitation of applied environment, greatly improve the expansion of opportunistic network applied environment; Additionally by multi-to-multi fuzzy keyword set between the route querying of Similarity Measure and calculating, relative to man-to-man situation before, the diffusivity of message in opportunistic network can be improved to a certain extent, improve the efficiency of opportunistic network in content is shared.
2. from the fail safe of route, the encryption search key search that the privacy of user is expanded by PEKS ensured, researcher before demonstrates PEKS can resist chosen-plain attact under random analogy speech model, certainly this is the hypothesis of difficulty based on Bilinear Diffie-Hellman Problem, unless this just means the TrapDoor that can get certain keyword, otherwise it is impossible for wanting to obtain keyword content, the process generating TrapDoor then needs the private key of TTP, generate and distribution so only have TTP can carry out calculating to Trapdoor.In encryption fuzzy keyword searching, concerning recipient, now in order to support the search of fuzzy keyword, to each interest keyword that it is submitted to, need first to generate corresponding fuzzy set according to it, and to each candidate word in fuzzy set, all follow analysis above.
3. concerning intermediate node, its process setting up routing and swiching route does not relate to the cryptographic algorithm to TrapDoor and cryptography key word, search in the process of route, come trapdoor function set and the matching degree calculating that the set of cryptography key word can be searched for by the TEST called in PEKS in FuzzyTest operation, and made routing decision.In this process, both do not get any one candidate word content of the interest keyword corresponding fuzzy set of recipient, do not get any index content of forwarded content yet, achieve complete privacy model.Search for based on the set of encryption fuzzy keyword on the one hand in addition; the privacy of user can be protected to a certain extent; even if the content distributed control information of user is broken, the exposure of fuzzy set still can not allow assailant bind doing between user identity and user interest accurately.
In sum; the present invention can be good at being applied to the safeguard protection in opportunistic network routing forwarding process, is particularly suitable for the secret protection that cannot ensure, carry out in loose, the focusing on people content-based opportunistic network system of trusting relationship between user and user routing table index information and the content distributed index information of publisher user in Message Transmission end-to-end link.In addition, the present invention can also create and search the routing iinformation supporting encryption fuzzy keyword searching, and the very big flexibility that improve content-based opportunistic network, the use dropping into people's daily life for opportunistic network is further had laid a good foundation.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Accompanying drawing explanation
Fig. 1 is a kind of opportunistic network routing method flow chart based on encryption fuzzy keyword of the present invention;
Fig. 2 is a kind of opportunistic network route system schematic diagram based on encryption fuzzy keyword of the present invention;
Fig. 3 is the content-based opportunistic network communication schematic diagram of one embodiment of the invention;
Fig. 4 is the opportunistic network establishing route based on encryption fuzzy keyword searching of one embodiment of the invention and searches schematic diagram;
Fig. 5 is FuzzyTest and the RoutingLookup algorithm false code figure of one embodiment of the invention.
Embodiment
Fig. 1 is a kind of opportunistic network routing method flow chart based on encryption fuzzy keyword of the present invention.As shown in Figure 1, the method comprises:
Step 1, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, calculate trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to subscription node;
Step 2, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Step 4, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table and carries out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculating the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, the similarity then generated according to described result of calculation carries out routing decision.
Further, described step 1 comprises:
Step 11, at the initial phase that described opportunistic network is disposed, determines this opportunistic network
In all legal keyword composition dictionary that relates to;
Step 12, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set.
Step 13, calculates its trapdoor for each fuzzy keyword in described fuzzy set, forms the trapdoor collection for each fuzzy keyword.
Subscription interest set of keywords in wherein said step 1 is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
Routing table in described step 4 is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
Fig. 2 is a kind of opportunistic network route system schematic diagram based on encryption fuzzy keyword of the present invention.As shown in Figure 2, this system comprises:
Interest processing module 100, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, calculate trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to subscription node;
Subscribe to processing module 200, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module 300, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Route processing module 400, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table, and is carried out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculate the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, then carry out routing decision according to described result of calculation.
Further, described interest processing module 100 comprises:
Initial processing module 110, at the initial phase that described opportunistic network is disposed, determines all legal keyword composition dictionary related in this opportunistic network;
Fuzzy Processing module 120, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set.
Trapdoor collection obtains module 130, calculates its trapdoor, form the trapdoor collection for each fuzzy keyword for each fuzzy keyword in described fuzzy set.
Subscription interest set of keywords in wherein said interest processing module 100 is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
Routing table in wherein said route processing module 400 is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
The present invention relates generally to following content: (1) is based on the construction method of the cryptography key word fuzzy set of dictionary and Similarity Match Method; (2) based on opportunistic network establishing route and the lookup method of encryption fuzzy keyword searching.
Existing fuzzy set construction method relative inefficiencies, such as " Wildcard-based Fuzzy SetConstruction ", each keyword correspondingly can produce O (l
d) (key length is l to individual fuzzy keyword, editing distance is d), if adopt such fuzzy set construction method to build the keyword fuzzy set of encryption, final caused computing cost and storage overhead are intolerable in the communication environment of the such relative complex of opportunistic network.
In addition current based in the contextual opportunistic network of society, there are the establishing route and lookup method that are realized by the search of cryptography key word, but the routing policy limitation that only can realize based on clear and definite cryptography key word is very large, be difficult to in the opportunistic network that to be extended to that focus be put on man content-based.
(1) based on construction method and the Similarity Match Method of the keyword fuzzy set of the encryption of dictionary
Specific practice:
At the initial phase that opportunistic network is disposed, determine all legal keyword composition dictionary that may relate in network.
First elementary fuzzy set is calculated by Wildcard-based Fuzzy SetConstruction for each legal keyword that may relate to.Then filtered out in elementary fuzzy set by dictionary that those do not have the keyword of practical significance, finally form secondary fuzzy set.
Calculate its trapdoor for fuzzy keyword each in secondary fuzzy set, form the trapdoor collection for each keyword.
Similarity can be calculated by similarity mode algorithm between any two trapdoor collection.(similarity mode algorithm is shown in accompanying drawing 5)
(2) based on opportunistic network establishing route and the lookup method of encryption fuzzy keyword searching
Specific practice:
The interest set of keywords of this contents extraction is submitted to trusted third party to calculate fuzzy set corresponding to each keyword and trapdoor collection and to return to this user by the user that certain intention obtains opportunistic network content.
Then this user wants to obtain trapdoor collection that content related interests keyword the maps routing iinformation as message, and the identity together with oneself indicates, composition subscribe to interest bag send to all run into turn originator node.
Turn originator node to get and subscribe to after interest, using the routing iinformation subscribed in interest bag as head, the identity of subscribing in interest bag is indicated and builds routing iinformation as afterbody and set up routing table.Multiplely turn the exchange carrying out routing iinformation between originator and carry out supplementary routing table.
Publisher's node is in content distributed, the PKI that the interest keyword this content extracted utilizes trusted third party to provide calculate corresponding can search key set, as content distributed control information, together with encryption after content distributed, form content distributed bag send to run into turn originator node.
Turn originator node get content distributed after, the head of the control information of content distributed bag and routing table route information is encrypted search key search and calculates, the similarity according to returning carries out routing decision.
Enumerate now an embodiment, specific as follows:
Content-based opportunistic network structure comprises three class users: subscriber A, turn originator B, publisher C, in such network model, want the user obtaining content from opportunistic network can be sent in the middle of network by the interest RA of oneself, publisher issues in the middle of concrete content PC to network, and intermediate node (one or more) then sets up routing table FT according to RA, is used for forwarding PC.Content-based opportunistic network structure chart as shown in Figure 3.
We define D
0for all legal english keyword composition dictionary that may relate in network, each node u has oneself interested all possible set of keywords
concerning each node, this is integrated in opportunistic network current life cycle and can not changes, and size is also fixing
much smaller than D
0size, different node
different.
In content-based opportunistic network, the interest of node has certain ageing, and namely through after a period of time, the interest of node can change, so subscriber can upgrade the interest of oneself as required.When user is as subscriber A, its interesting broadcast RA is by control information CI
aand the identity composition of A, be expressed as RA=[CI
a, ID
a].
When not considering safe, CI
a=W
a, wherein
represent current time, the interested N of A
aindividual keyword,
iD
afor the unique identification of A.Here it is emphasized that the node in all opportunistic networks, N
a=M
c=N
0it is a fixed value.
When user is as publisher C, its content issued is by control information CI
c, load P
cset with the access control policy of message
composition, is expressed as PC=[CI
c, P
c].When not considering privacy and confidentiality, CI
c=W
c, representative can index load P
cm
cindividual keyword composition, wherein
p
cfor the net load that PC is content distributed.
When user is as intermediate node B, the kth bar route in its routing table is expressed as FT [k]=[RI
k, SID
k].SID
kthen represent RI
kinterested subscriber's set.Intermediate node also can safeguard oneself a message buffer list List
b, be the set needing to forward content, size is L
bbe expressed as
PEKS is a kind of cryptography key word searching method based on bilinear map, allows a node to judge whether there is some keyword in enciphered data when obtaining any redundant information.PEKS is made up of three cryptographic primitive:
1) PEKS uses the PKI of certain node A and a keyword w as input, exporting the cryptography key word w' that can search for of w, when only having w', cannot get w.Be expressed as
w'=PEKS(A
pub,w)
2) Trapdoor uses the private key of certain node A and keyword w as input, exports the trapdoor TD of w
w, the calculating of trapdoor function needs the private key of node A, so it is privately owned.Be expressed as
TD
w=Trapdoor(A
priv,w)
3) Test uses a cryptography key word w' and trapdoor function TD that can search for as input, returns true, otherwise return false when meeting the trapdoor and the trapdoor that TD is same w to be associated that TD is w at the same time.Be expressed as
Flag=Test(w',TD)
Flag=true,if TD=Trapdoor(A
priv,w)
Flag=false,if TD≠Trapdoor(A
priv,w)
Safety routing method in the present invention is specifically implemented to be described below:
Certain subscriber A
iissue the interest RA=[CI of oneself
a, ID
a], A
iwill
submit to trusted third party TTP, calculated the trapdoor function collection of fuzzy set and correspondence by TTP.To subscriber A
ieach keyword interested, produces the fuzzy set based on dictionary
The fuzzy set of each keyword is sent to trusted third party TTP, according to its private key TTP
privthe fuzzy keyword trapdoor collection that structure is corresponding,
The trapdoor collection mapped by each keyword is afterwards as new
produce new RA
isend to all intermediate nodes run into.Turn originator B
kreceiving subscriber A
ithe RA sent
iafterwards, can by each RA
iin control information as the stem of routing table, by A
iidentity be filled in the middle of routing table as last portion, as a route, this completes the initial foundation of route.Two turn originator after meeting, and can carry out the exchange of route, in the middle of the routing table being routed to oneself copying the other side.
Publisher C
jthe new content load produced
afterwards, can the set of keywords of this load of index according to wanted content distributed specifying information mark
utilize the PKI TTP of trusted third party
pubcalculate
corresponding keyword PEKS gathers, as new
With the load after encryption
form PC in the lump
j, send to all run into turn originator.The sequence of events that Bob occurs after running into subscriber Alice in an initial condition as shown in Figure 4.
If intermediate node B runs into node D, then carry out route querying, more clear in order to describe, we define a kind of for trapdoor function S set
tDwith can search for cryptography key word S set
w'between operation FuzzyTest (S
tD, S
w'), the implication of this operation is S
w'the index of representative and S
tDmatching degree between the routing iinformation of representative, return value is larger, represents the matching degree searched for generally higher.Based on this operation, carry out route querying according to Routing Algorithm Routing Lookup and carry out routing decision.The algorithm false code of FuzzyTest and RoutingLookup as shown in Figure 5.
Certainly; the present invention also can have other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art are when making various corresponding change and distortion according to the present invention, but these change accordingly and are out of shape the protection range that all should belong to the claim appended by the present invention.
Claims (6)
1., based on an opportunistic network routing method for encryption fuzzy keyword, it is characterized in that, comprising:
Step 1, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, trapdoor collection is calculated again according to described fuzzy set, and this trapdoor collection is returned to subscription node, wherein said step 1 comprises: step 11, at the initial phase that described opportunistic network is disposed, determines all legal keyword composition dictionary related in this opportunistic network;
Step 12, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set;
Step 13, calculates its trapdoor for each fuzzy keyword in described fuzzy set, forms the trapdoor collection for each fuzzy keyword;
Step 2, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes described trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Step 4, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table, and is carried out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculate the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, then carry out routing decision according to described result of calculation.
2. as claimed in claim 1 based on the opportunistic network routing method of encryption fuzzy keyword, it is characterized in that, subscription interest set of keywords in described step 1 is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
3., as claimed in claim 1 based on the opportunistic network routing method of encryption fuzzy keyword, it is characterized in that, the routing table in described step 4 is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
4., based on an opportunistic network route system for encryption fuzzy keyword, it is characterized in that, comprising:
Interest processing module, subscribe to node and the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, first the fuzzy set that in described subscription interest set of keywords, each interest keyword is corresponding is calculated by described trusted third party, trapdoor collection is calculated again according to described fuzzy set, and this trapdoor collection is returned to subscription node, wherein said interest processing module comprises:
Initial processing module, at the initial phase that described opportunistic network is disposed, determines all legal keyword composition dictionary related in this opportunistic network;
Fuzzy Processing module, calculates elementary fuzzy set for each legal keyword in this all legal keyword composition dictionary by Wildcard-based Fuzzy Set Construction, then by dictionary filtration treatment, obtains fuzzy set;
Trapdoor collection obtains module, calculates its trapdoor, form the trapdoor collection for each fuzzy keyword for each fuzzy keyword in described fuzzy set;
Subscribe to processing module, described subscription node is using the routing iinformation of described trapdoor collection as message, utilize the identify label composition of described routing iinformation and described subscription node to subscribe to interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, the search key set that in described issue interest set of keywords, each interest keyword is corresponding is calculated according to cryptography key word algorithm can be searched for, and using described search key set as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
Route processing module, after described forward node receives described subscription interest bag, using its routing iinformation as head, its identify label, as afterbody, is set up routing table and carries out routing decision according to described routing table;
The control information of the described content distributed bag that described forward node is received, and the head of routing iinformation in described routing table, according to can search for cryptography key word algorithm carry out searching for cryptography key word search calculate, and then calculate the similarity between content distributed bag control information and trapdoor collection by similarity mode algorithm, then carry out routing decision according to described result of calculation.
5. as claimed in claim 4 based on the opportunistic network route system of encryption fuzzy keyword, it is characterized in that, subscription interest set of keywords in described interest processing module is dynamic change, subscribes to node regularly changes opportunistic network content subscription interest set of keywords according to the interests change of subscriber.
6. as claimed in claim 4 based on the opportunistic network route system of encryption fuzzy keyword, it is characterized in that, routing table in described route processing module is dynamic change, and multiple turning between originator upgrades described routing table by the Dynamic of exchange carrying out routing iinformation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310153333.3A CN103297962B (en) | 2013-04-27 | 2013-04-27 | A kind of opportunistic network routing method based on encryption fuzzy keyword and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310153333.3A CN103297962B (en) | 2013-04-27 | 2013-04-27 | A kind of opportunistic network routing method based on encryption fuzzy keyword and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103297962A CN103297962A (en) | 2013-09-11 |
CN103297962B true CN103297962B (en) | 2015-08-26 |
Family
ID=49098146
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310153333.3A Expired - Fee Related CN103297962B (en) | 2013-04-27 | 2013-04-27 | A kind of opportunistic network routing method based on encryption fuzzy keyword and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103297962B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105307176B (en) * | 2015-11-10 | 2019-03-08 | 中国科学院信息工程研究所 | Robustness message routing method in a kind of mobile social opportunistic network |
CN107302518B (en) * | 2016-04-15 | 2020-02-14 | 任子行网络技术股份有限公司 | Method and device for sensing safety state of inter-domain routing system based on weighted similarity |
CN108055657A (en) * | 2017-12-14 | 2018-05-18 | 深圳Tcl数字技术有限公司 | Nodal information retransmission method, the network equipment and computer readable storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945134A (en) * | 2010-09-20 | 2011-01-12 | 中国人民解放军国防科学技术大学 | Event matching method based on popularity of attributes in publication and subscription system |
-
2013
- 2013-04-27 CN CN201310153333.3A patent/CN103297962B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945134A (en) * | 2010-09-20 | 2011-01-12 | 中国人民解放军国防科学技术大学 | Event matching method based on popularity of attributes in publication and subscription system |
Non-Patent Citations (1)
Title |
---|
基于精细梯度策略的多链路协同数据转发协议;朱红松等;《软件学报》;20091115;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103297962A (en) | 2013-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Blockchain-based searchable symmetric encryption scheme | |
Shen et al. | A secure cloud-assisted urban data sharing framework for ubiquitous-cities | |
US10181049B1 (en) | Method and apparatus for secure and privacy-preserving querying and interest announcement in content push and pull protocols | |
Liu et al. | Toward secure distributed data storage with error locating in blockchain enabled edge computing | |
Guan et al. | Toward privacy-preserving cybertwin-based spatiotemporal keyword query for ITS in 6G era | |
Yu et al. | Privacy protection scheme based on CP-ABE in crowdsourcing-IoT for smart ocean | |
Zhang et al. | Enabling robust and privacy-preserving resource allocation in fog computing | |
Naresh et al. | Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm | |
Saldamli et al. | Private proximity testing with an untrusted server | |
CN103905469A (en) | Security control system and method applied to smart grid wireless sensing network and cloud computing | |
Li et al. | A Lightweight Fine‐Grained Searchable Encryption Scheme in Fog‐Based Healthcare IoT Networks | |
Li et al. | Secure and temporary access delegation with equality test for cloud-assisted IoV | |
CN114036240A (en) | Multi-service provider private data sharing system and method based on block chain | |
Safaei Yaraziz et al. | Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions | |
Peng et al. | LS-RQ: A lightweight and forward-secure range query on geographically encrypted data | |
CN103297962B (en) | A kind of opportunistic network routing method based on encryption fuzzy keyword and system | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Wang et al. | AFFIRM: Provably forward privacy for searchable encryption in cooperative intelligent transportation system | |
Ma et al. | A new framework of IND-CCA secure public key encryption with keyword search | |
CN108632257B (en) | Method and system for acquiring encrypted health record supporting hierarchical search | |
CN112632063B (en) | Restricted shortest distance query method, electronic device, and readable storage medium | |
Wang et al. | A blockchain-based fine-grained access data control scheme with attribute change function | |
Li et al. | A Dynamic Location Privacy Protection Scheme Based on Cloud Storage. | |
Shan et al. | Fuzzy keyword search over encrypted cloud data with dynamic fine-grained access control | |
Lv et al. | A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150826 |
|
CF01 | Termination of patent right due to non-payment of annual fee |