27 May 2024 | Zhang Xuemin1,2 · Deng Haitao1,2 · Xiong Zenggang1,2 · Rao Ying1,2 · Liu Yanchao1 · Li Yuan1,2 · Hou Delin1,2
The paper "Self-Organizing Key Security Management Algorithm in Socially Aware Networking" addresses the security challenges in socially aware networking (SKSM), a network paradigm that integrates features from Delay Tolerant Networks (DTN), Opportunity Networks (OppNet), and Mobile Autonomous Networking (MANET). The authors propose a Self-organizing Key Security Management Algorithm (SKSM) to enhance the security of encryption algorithms used in SKSM. The SKSM algorithm consists of three main components: node authentication protocol, node trust management, and key slice transmission.
1. **Node Authentication Protocol**: Utilizes zero-knowledge authentication to verify network nodes.
2. **Node Trust Management**: Manages the trust values of nodes dynamically.
3. **Key Slice Transmission**: Segments keys for secure transmission and ensures that encrypted information is not leaked or intercepted.
The simulation results show that the SKSM algorithm outperforms traditional algorithms in ensuring secure message transmission, improving transmission rates, and reducing average network latency. The paper also reviews existing key management strategies, including threshold scheme-based management, identity cryptography-based management, and certificate chain-based key management, highlighting their strengths and limitations. The SKSM algorithm aims to address the security challenges in SKSM by providing a robust and efficient key management solution.The paper "Self-Organizing Key Security Management Algorithm in Socially Aware Networking" addresses the security challenges in socially aware networking (SKSM), a network paradigm that integrates features from Delay Tolerant Networks (DTN), Opportunity Networks (OppNet), and Mobile Autonomous Networking (MANET). The authors propose a Self-organizing Key Security Management Algorithm (SKSM) to enhance the security of encryption algorithms used in SKSM. The SKSM algorithm consists of three main components: node authentication protocol, node trust management, and key slice transmission.
1. **Node Authentication Protocol**: Utilizes zero-knowledge authentication to verify network nodes.
2. **Node Trust Management**: Manages the trust values of nodes dynamically.
3. **Key Slice Transmission**: Segments keys for secure transmission and ensures that encrypted information is not leaked or intercepted.
The simulation results show that the SKSM algorithm outperforms traditional algorithms in ensuring secure message transmission, improving transmission rates, and reducing average network latency. The paper also reviews existing key management strategies, including threshold scheme-based management, identity cryptography-based management, and certificate chain-based key management, highlighting their strengths and limitations. The SKSM algorithm aims to address the security challenges in SKSM by providing a robust and efficient key management solution.