Next Article in Journal
Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling
Previous Article in Journal
Learning Improved Semantic Representations with Tree-Structured LSTM for Hashtag Recommendation: An Experimental Study
Open AccessArticle

A Privacy-Preserving Protocol for Utility-Based Routing in DTNs

1
College of Computer Science and Engineering, Changshu Institute of Technology, Changshu 225500, China
2
College of Mathematics Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China
3
College of Information and Electronic Technology, Jiamusi University, Jiamusi 154007, China
4
College of Computer Science and Information Technology, Daqing Normal University, Daqing 163712, China
*
Author to whom correspondence should be addressed.
Information 2019, 10(4), 128; https://doi.org/10.3390/info10040128
Received: 12 February 2019 / Revised: 19 March 2019 / Accepted: 31 March 2019 / Published: 8 April 2019
(This article belongs to the Section Information and Communications Technology)
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility. The privacy information of encounter time and frequency will be leaked when nodes communicate with real IDs. Node ID anonymity can protect the privacy information, but it also prevents nodes from collecting encounter information to calculate the real utility value. To solve the above problem, this paper proposes a privacy-preserving protocol for utility-based routing (PPUR) in DTNs. When node encounter occurs in PPUR, they anonymously generate and collect the encounter record information by pseudo-IDs. Then, nodes forward the information to a trusted authority (TA), which calculates the routing utility value and returns it to the nodes, so that nodes can protect the privacy information and obtain the real utility value at the same time. PPUR also protects the confidentiality and integrity of messages through hashing and digital signature. The experimental results show that PPUR can not only protect nodes’ privacy information, but also effectively forward messages with real utility value. View Full-Text
Keywords: delay-tolerant networks (DTNs); privacy-preserving; utility-based; encounter information delay-tolerant networks (DTNs); privacy-preserving; utility-based; encounter information
Show Figures

Figure 1

MDPI and ACS Style

Jiang, Q.; Deng, K.; Zhang, L.; Liu, C. A Privacy-Preserving Protocol for Utility-Based Routing in DTNs. Information 2019, 10, 128.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop