Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network
Journal Title: EMITTER International Journal of Engineering Technology - Year 2016, Vol 4, Issue 1
Abstract
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms, we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.
Authors and Affiliations
Samsul Huda, Amang Sudarsono, Tri Harsono
Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers
Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to...
Semi Automatic Retargeting for Facial Expressions of 3D Characters with Fuzzy logicBased on Blendshape Interpolation
To produce a 3D virtual character's face expression of human’s natural face expressions, facial motion capture is the technique considered to be the most effective one, especially in terms of production speed. However, t...
Spatio-Temporal Deforestation Measurement Using Automatic Clustering
Deforestation is one of the crucial issues in Indonesia. In 2012, deforestation rate in Indonesia reached 0.84 million hectares, exceeding Brazil. According to the 2009 Guinness World Records, Indonesia's deforestation r...
LOVETT Scaling with Flex Sensor and MYO Armband for Monitoring Finger Muscles Therapy of Post-Stroke People
LOVETT scale is a common parameter used by the doctor or therapist to determine the muscle strength of the patient’s hands, especially patients with post-stroke. As a result of previous work of our group, a sensory glove...
Performance of Implementation IBR-DTN and Batman-Adv Routing Protocol in Wireless Mesh Networks
Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility,...