TY - JOUR
T1 - Non-interactive Identity-Based Underwater Data Transmission with Anonymity and Zero Knowledge
AU - Wan, Changsheng
AU - Phoha, Vir Virander
AU - Tang, Yuzhe
AU - Hu, Aiqun
N1 - Funding Information:
Manuscript received August 12, 2017; revised September 12, 2017 and September 25, 2017; accepted September 25, 2017. Date of publication September 28, 2017; date of current version February 12, 2018. This work was supported in part by National Natural Science Foundation of China under Grants 61101088 and 71402070, in part by Opening Project of Key Lab of Information Network Security of Ministry of Public Security (C16604), in part by Natural Science Foundation of Jiangsu Province (BK20161099), and in part by National Science Foundation (Award SaTC No.: 1527795). The review of this paper was coordinated by Prof. Alfredo Luigi Grieco. (Corresponding author: Changsheng Wan).
Publisher Copyright:
© 1967-2012 IEEE.
PY - 2018/2
Y1 - 2018/2
N2 - Due to the lack of security infrastructures for underwater wireless communications among vehicles, data transmission protocols typically use identity-based cryptography for protecting transmitted data. However, current identity-based cryptographic schemes transmit vehicles' real identities along with the messages, which makes the communication schemes vulnerable to attacks. For example, the adversaries can infer real identities of the vehicles and thus collect important information about underwater vehicles, track them, and thus be in an advantageous position to attack them. In addition, during data transmission, adversaries can count the number of underwater vehicles that are communicating and thus evaluate the enemy's scale of operations. At the same time, due to the complex underwater environment, transmitted messages can be easily lost. Therefore, non-interactive data transmission schemes that ensure the underwater vehicles do not transmit additional messages for authentication and key establishment are needed. To address these needs, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols in this field, our protocols provide integrity and confidentiality protections for transmitted messages. However, as opposed to the other well-known approaches, our protocols do not expose information of vehicles' real identities and use different identities for transmitting each message. By doing so, our protocols provide protection against adversaries' collection of information about underwater vehicles. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, thus achieving the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information about each other. Therefore, we posit that our protocols are quite suitable for transmitting messages for underwater environment. Experimental results show that the proposed protocols are feasible for real-world applications.
AB - Due to the lack of security infrastructures for underwater wireless communications among vehicles, data transmission protocols typically use identity-based cryptography for protecting transmitted data. However, current identity-based cryptographic schemes transmit vehicles' real identities along with the messages, which makes the communication schemes vulnerable to attacks. For example, the adversaries can infer real identities of the vehicles and thus collect important information about underwater vehicles, track them, and thus be in an advantageous position to attack them. In addition, during data transmission, adversaries can count the number of underwater vehicles that are communicating and thus evaluate the enemy's scale of operations. At the same time, due to the complex underwater environment, transmitted messages can be easily lost. Therefore, non-interactive data transmission schemes that ensure the underwater vehicles do not transmit additional messages for authentication and key establishment are needed. To address these needs, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols in this field, our protocols provide integrity and confidentiality protections for transmitted messages. However, as opposed to the other well-known approaches, our protocols do not expose information of vehicles' real identities and use different identities for transmitting each message. By doing so, our protocols provide protection against adversaries' collection of information about underwater vehicles. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, thus achieving the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information about each other. Therefore, we posit that our protocols are quite suitable for transmitting messages for underwater environment. Experimental results show that the proposed protocols are feasible for real-world applications.
KW - Anonymity
KW - identity-based data transmission
KW - non-interactivity
KW - underwater wireless communications
KW - zero-knowledge
UR - http://www.scopus.com/inward/record.url?scp=85030683319&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85030683319&partnerID=8YFLogxK
U2 - 10.1109/TVT.2017.2757500
DO - 10.1109/TVT.2017.2757500
M3 - Article
AN - SCOPUS:85030683319
SN - 0018-9545
VL - 67
SP - 1726
EP - 1739
JO - IEEE Transactions on Vehicular Technology
JF - IEEE Transactions on Vehicular Technology
IS - 2
ER -