SDDR: Light-Weight, Secure Mobile Encounters
نویسندگان
چکیده
Emerging mobile social apps use short-range radios to discover nearby devices and users. The device discovery protocol used by these apps must be highly energy-efficient since it runs frequently in the background. Also, a good protocol must enable secure communication (both during and after a period of device co-location), preserve user privacy (users must not be tracked by unauthorized third parties), while providing selective linkability (users can recognize friends when strangers cannot) and efficient silent revocation (users can permanently or temporarily cloak themselves from certain friends, unilaterally and without re-keying their entire friend set). We introduce SDDR (Secure Device Discovery and Recognition), a protocol that provides secure encounters and satisfies all of the privacy requirements while remaining highly energyefficient. We formally prove the correctness of SDDR, present a prototype implementation over Bluetooth, and show how existing frameworks, such as Haggle, can directly use SDDR. Our results show that the SDDR implementation, run continuously over a day, uses only ∼10% of the battery capacity of a typical smartphone. This level of energy consumption is four orders of magnitude more efficient than prior cryptographic protocols with proven security, and one order of magnitude more efficient than prior (unproven) protocols designed specifically for energy-constrained devices.
منابع مشابه
Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks
‘Secure routing in Mobile Ad hoc networks’ and ‘Internet connectivity to Mobile Ad hoc networks’ have been dealt separately in the past research. This paper proposes a light weight solution for secure routing in integrated Mobile Ad hoc Network (MANET)-Internet. The proposed framework ensures mutual authentication of Mobile Node (MN), Foreign Agent (FA) and Home Agent (HA) to avoid various atta...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملTwo-Level ZigBee-4G Design for Secure and Efficient Communications in the Resources Constrained Military Environment
The widely acknowledged problem of hostile and dynamic military environment introduces several new challenges for efficient and secure communications of coalition armies. Mobile Ad-hoc Network has been the subject of much research recently as a solution due to its dynamic and light weight infrastructure and 4G has been considered as a future of cellular communication systems to the commercial w...
متن کاملPrivacy Protection for Mobile Cloud Data: A Network Coding Approach
Taking into account of both the huge computing power of intruders and the untrustedness of cloud servers, we develop an enhanced secure pseudonym scheme to protect the privacy of mobile cloud data. To face the huge computing power challenge, we develop an unconditionally secure light-weight network coding pseudonym scheme. For the privacy issue of untrusted cloud server, we further design a two...
متن کاملA stem cell-derived gene (Sddr) negatively regulates differentiation of embryonic stem cells.
Embryonic stem (ES) cells, derived from the inner cell mass of blastocysts, are pluripotent and continue to self-renew. To better understand the molecular mechanisms underlying self-renewal, we have been searching for a gene(s) which is specifically expressed in self-renewing ES cells. Here we report the isolation and characterization of a novel gene, Sddr (stem cell-derived differentiation reg...
متن کامل