Title: SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network

Authors: Mohamed Amine Ferrag; Mehdi Nafa; Salim Ghanemi

Addresses: Department of Computer Science, Badji Mokhtar-Annaba University, P.O. Box 12, 23000 Annaba, Algeria ' Department of Computer Science, Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, B.P.12, Annaba, 23000, Algeria ' Department of Computer Science, Embedded Systems Laboratory (LASE), Badji Mokhtar-Annaba University, B.P.12, Annaba, 23000, Algeria

Abstract: In this paper, we propose an intelligent secure detection scheme with strong privacy-preserving, called SDPP, for improving routing security and achieving privacy preservation of message in mobile peer-to-peer social network (MP2PSN). Specifically, in the proposed SDPP scheme, each user is granted with a pseudo-ID, a certificate, and its private key corresponding to his similar interests. Based on the cooperative neighbour technique and the homomorphic encryption method, the proposed SDPP scheme cannot only detect and avoid black hole attacks but it also can preserve the message privacy. Through security analysis, we show that the proposed scheme is secure in the MP2PSN scenarios. Moreover, we also discuss how SDPP can achieve the privacy-preservation of message and the evolution of users' certificates. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of black hole detection rate, average Detectreq reporting, and average transmission delay under various scenarios.

Keywords: mobile networks; P2P networks; peer-to-peer networks; social networks; MP2PSN; network security; privacy preservation; privacy protection; re-signature cryptography; homomorphic encryption; hash chains; routing attacks; bilinear pairings; certificate evolution; routing security; black hole attacks; simulation; Detectreq reporting; transmission delay.

DOI: 10.1504/IJICS.2014.066650

International Journal of Information and Computer Security, 2014 Vol.6 No.3, pp.241 - 269

Received: 28 Nov 2013
Accepted: 17 Jun 2014

Published online: 14 Jan 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article