The opportunity network has the characteristics of high self-organization,mobility,gap connectivity and unstable network topology,which makes the traditional network security scheme not suitable for the opportunity network.This poses a huge threat to privacy protection,given the presence of malicious node attacks in the opportunity network.Therefore,how to ensure the security of data storage and transmission is the key technology of privacy protection in the network data transmission,which has theoretical and practical significance.A fuzzy identity-based access control scheme is proposed in this paper.The scheme assumes that there is only one trusted key generation center PKG that does not have to be online in real-time,which PKG sends private keys to every user who joins the network.At the same time,the blacklist user attribute set is used to encrypt the data,so that users can selectively exclude data access from specific members.Compared with the traditional privacy protection scheme of data transmission,using the attribute information of the user's own biological feature,it can effectively prevent the malicious node from falsifying the attribute to transmit the data,and can improve the security of the system better.The main research work of this paper:Firstly,according to the characteristics of opportunistic network and the principles of cryptography,this paper studies several typical encryption schemes,especially identity-based encryption schemes.In this paper,based on the identity-based encryption scheme,a fuzzy identity encryption scheme is proposed to use the attribute information of the user's biological feature as the utility value,which can effectively prevent the malicious node from forgery attribute forwarding data.Secondly,a negative access control is added to the fuzzy identity encryption scheme,and the user's access rights are specified,so that users can selectively exclude malicious users access to data.The scheme is composed of system initialization,private key generation phase,encryption and decryption stage,and the scheme is extended and the user revocation mechanism is proposed.Thirdly,the ONE emulator is used to simulate the encryption scheme proposed in this paper,the simulation results show that this scheme has some advantages in message delivery rate and routing cost by comparing with epidemic,Propicman and Ibe-propicman algorithm,and the message has no obvious average delay.The calculation cost is slightly lower than the existing scheme. |