Browsing by Author "Feng, Wei"
Now showing 1 - 13 of 13
Results Per Page
Sort Options
Item Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing(IEEE, 2022-08-15) Feng, Wei; Yan, Zheng; Yang, Laurence T.; Zheng, Qinghua; Department of Communications and Networking; Network Security and Trust; Saint Francis Xavier University; Xi'an Jiaotong University; Xidian UniversityMobile crowdsourcing (MCS) has become an effective data collection method due to its mobility, low cost, and flexibility. However, since centralized MCS confronts severe security and privacy risks in reality, many researchers are devoted to building a decentralized MCS system based on blockchain. Despite the effectiveness of these schemes, they fail to offer anonymous authentication on the trust of MCS nodes, although privacy is a main concern in MCS and trust plays an important role in a series of MCS activities such as worker selection and truth discovery. Nevertheless, anonymous authentication on trust is not a trivial issue since trust evaluation usually conflicts with anonymity, which is a necessary privacy requirement in an open MCS environment. To tackle this problem, we leverage Intel Software Guard Extension (SGX) and propose a scheme to anonymously authenticate trust with trustworthy trust evaluation in a blockchain-based MCS system. The scheme employs an SGX-enabled cloud server to periodically alter user public/private key pairs and mix newly altered keys among a number of faked keys in order to ensure unlinkability. Besides, we consider the unique features of MCS and work out a novel trust evaluation method by aggregating both subjective feedback and objective behaviors. Finally, we conduct several analyses and experiments to illustrate its security and efficiency.Item Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature(2017) Feng, Wei; Yan, Zheng; Xie, Haomeng; Department of Communications and Networking; Xidian UniversityPervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue. One of the effective methods to achieve privacy preservation is anonymous authentication on trust. However, few literatures pay attention to it. In this paper, we propose an anonymous authentication scheme based on group signature for authenticating trust levels rather than identities of nodes in order to avoid privacy leakage and guarantee secure communications in PSN. The scheme achieves secure anonymous authentication with anonymity and conditional traceability with the support of a trusted authority (TA). We also provide a mechanism to guarantee communications among nodes when TA is not available for some nodes. In addition, the utilization of batch signature verification further improves the efficiency of authenticity verification on a large number of messages. Performance analysis and evaluation further prove that the proposed scheme is effective with regard to privacy preservation, computation complexity, communication cost, flexibility, reliability, and scalability.Item AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking(2020) Wang, Pu; He, Limei; Yan, Zheng; Feng, Wei; Xidian University; Department of Communications and Networking; Yu, Shui; Mueller, Peter; Qian, JiangboPervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any place. One of the most important issues in PSN is its security and privacy, since users hope their privacy not to be disclosed in social activities. Trust relationship plays a crucial role in the PSN system, and can be utilized to support trustworthy PSN system with anonymous authentication. Thus, this paper proposes an anonymous trust authentication (AnonyTrust) scheme that can simultaneously authenticate identities and trust levels of users with privacy preservation. It also can achieve conditional traceability with a trusted server (TS), and can switch online and offline states with multiple authorized access points (APs). The security analysis and performance evaluation show the scheme is secure and efficient regarding security, anonymity, computational complexity, and communication cost. To verify the feasibility of the proposed scheme, a lightweight secret chat application called AnonyChat is developed in practice. The results show AnonyChat performs well and efficiently in Android devices.Item Blockchain Based Data Transmission Control for Tactical Data Link(Chongqing University of Posts and Telecommunications, 2021-08) Feng, Wei; Li, Yafeng; Yang, Xuetao; Yan, Zheng; Chen, Liang; Department of Communications and Networking; Network Security and Trust; China Electronics Technology Group Corporation; Xidian UniversityTactical Data Link (TDL) is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant, automatic, and secure way. So far, TDL has shown its excellence in military applications. Current TDL adopts a distributed architecture to enhance anti-destruction capacity. However, It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains. To tackle this problem, we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL. It achieves automatic data transmission and realizes information consistency among different TDL entities. Besides, applying smart contracts based on blockchain further enables adjusting data transmission policies automatically. Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.Item Efficient LBS queries with mutual privacy preservation in IoV(Elsevier BV, 2019-04-01) Liu, Shushu; Liu, An; Yan, Zheng; Feng, Wei; Department of Communications and Networking; Soochow University; Xidian UniversityPublic awareness on privacy stimulates many researches about privacy-preserving location based services (LBS) in terms of providing mutual privacy to both LBS and its users. However, the high latency of privacy preservation in LBS becomes a main obstacle for applying LBS to Internet of Vehicles (IoV). To solve this problem, we propose two privacy-preserving LBS query schemes (kNN and T-kNN) by taking the advance of fog computing and by applying oblivious transfer (OT) and ciphertext-policy attribute based encryption (CP-ABE). Given a query from a vehicle, both schemes return k nearest POIs as response, with the difference that T-kNN supports fine-grained type based POI queries. Based on our proposed oblivious key transfer and privacy-preserving secret key generation, both schemes preserve mutual privacy of both LBS provider and vehicles. Complexity analysis and empirical study show that our approach outperforms the other two state-of-the-art works.Item MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain(ELSEVIER SCIENCE BV, 2019-06-01) Feng, Wei; Yan, Zheng; Department of Communications and NetworkingMobile Crowdsourcing (MCS) is an effective and novel method of data collection and processing. Current MCS generally adopts a centralized architecture by depending on an assumed trusted party. This design easily suffers from single-point failure and cannot be realized in practice since a trusted service provider does not really exist. More dangerously, the centralized party may perform dishonestly and thus harms the benefit and privacy of MCS users. To tackle these problems, we propose a novel blockchain-based MCS system, named MCS-Chain, to realize fully distributed and decentralized trust management in MCS. Aiming at improving the poor efficiency of traditional blockchain technology, we propose a novel consensus mechanism for block generation, which greatly reduces computational overhead. The proposed MCS-Chain system also solves the fork issue and centralization problem suffered by most existing blockchain-based systems. Serious security analysis and experimental evaluation further illustrate the security and efficiency of our system.Item A novel scheme of anonymous authentication on trust in Pervasive Social Networking(2018-06-01) Yan, Zheng; Wang, Pu; Feng, Wei; Department of Communications and Networking; Xidian UniversityPervasive Social Networking (PSN) supports various social activities at any time and in any places with the heterogeneous networks. Trust plays a crucial role in securing PSN. Authenticating trust anonymously is becoming an attractive approach to ensuring trustworthy and privacy-preserving social networking. However, the literature still lacks serious studies on this topic, especially for PSN systems. In this paper, we propose a novel scheme to authenticate PSN node trust in an anonymous and semi-distributed manner. The scheme allows one or multiple Authorized Parties (APs) to announce up-to-date aggregate lists of Integrated Node Trust (INT) for certificateless authenticating trust with anonymity, unforgeability, unlinkability and conditional traceability. In addition, multiple APs can cooperate to flexibly conduct trust authentication without significantly increasing computational overhead. Aggregate signature verification further improves scheme efficiency. Security proof, performance analysis and evaluation show that our scheme is effective with regard to security, privacy preservation, computational complexity, communication cost, efficiency, scalability and flexibility.Item Privacy Preservation in Permissionless Blockchain: A Survey(Chongqing University of Posts and Telecommunications, 2021-08) Peng, Li; Feng, Wei; Yan, Zheng; Li, Yafeng; Zhou, Xiaokang; Shimizu, Shohei; Department of Communications and Networking; Network Security and Trust; China Electronics Technology Group Corporation; RIKEN; Shiga University; Xidian UniversityPermissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the initial cryptocurrency to the Internet of Things (IoT) and Vehicular Ad-Hoc Networking (VANET), which is considered as the beginning of rewriting our digital infrastructure. However, blockchain confronts some privacy risks that hinder its practical applications. Though numerous surveys reviewed the privacy preservation in blockchain, they failed to reveal the latest advances, nor have they been able to conduct a unified standard comprehensive classification of the privacy protection of permissionless blockchain. Therefore, in this paper, we analyze the specific characteristics of permissionless blockchain, summarize the potential privacy threats, and investigate the unique privacy requirements of blockchain. Existing privacy preservation technologies are carefully surveyed and evaluated based on our proposed evaluation criteria. We finally figure out open research issues as well as future research directions from the perspective of privacy issues.Item Privacy protection in mobile crowd sensing: a survey(Springer New York, 2019-11-20) Wang, Yongfeng; Yan, Zheng; Feng, Wei; Liu, Shushu; Department of Communications and Networking; Network Security and Trust; Xidian UniversityThe unprecedented proliferation of mobile smart devices has propelled a promising computing paradigm, Mobile Crowd Sensing (MCS), where people share surrounding insight or personal data with others. As a fast, easy, and cost-effective way to address large-scale societal problems, MCS is widely applied into many fields, e.g., environment monitoring, map construction, public safety, etc. Despite the popularity, the risk of sensitive information disclosure in MCS poses a serious threat to the participants and limits its further development in privacy-sensitive fields. Thus, the research on privacy protection in MCS becomes important and urgent. This paper targets the privacy issues of MCS and conducts a comprehensive literature research on it by providing a thorough survey. We first introduce a typical system structure of MCS, summarize its characteristics, propose essential requirements on privacy on the basis of a threat model. Then, we survey existing solutions on privacy protection and evaluate their performances by employing the proposed requirements. In essence, we classify the privacy protection schemes into four categories with regard to identity privacy, data privacy, attribute privacy, and task privacy. Besides, we review the achievements on privacy-preserving incentives in MCS from four viewpoints of incentive measures: credit incentive, auction incentive, currency incentive, and reputation incentive. Finally, we point out some open issues and propose future research directions based on the findings from our survey.Item SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation(Elsevier, 2021-06) Liu, Gao; Yan, Zheng; Feng, Wei; Jing, Xuyang; Chen, Yaxing; Atiquzzaman, Mohammed; Xidian University; Network Security and Trust; Xi'an Jiaotong University; University of Oklahoma; Department of Communications and NetworkingIn order to evaluate network trust, different intrusion detection methods have been proposed. However, it is difficult for a single detection node to collect massive data and perform detection and evaluation in a large-scale network. In addition, disclosure of security-related data and detection pattern might weaken data provision incentives due to privacy concern, which could result in deliberately forging data to evade detection. Current literature still lacks a general framework to conduct decentralized intrusion detection towards network trust evaluation with privacy preservation. In this paper, we propose SeDID, a Software Guard Extension (SGX)-enabled decentralized intrusion detection framework for network trust evaluation based on blockchain. We design a novel consensus mechanism to avoid forking and guarantee high efficiency and real decentralization, where block creation is uniquely consented by miners and block creation difficulty is determined by the number of blocks previously created by a relative miner within a time window. The smaller the number, the easier the miner creates a new block. SeDID also offers incentives according to node contributions for motivating security-related data collection, intrusion detection and network trust evaluation. Additional employment of Intel SGX makes SeDID preserve both data and pattern privacy. We analyze SeDID’s efficacy in terms of incentive, privacy preservation and security. Its performance is further evaluated through simulations. In specific settings, its block creation time, task completion time and throughput are 19.61s, 44.55s and 224.47 transactions/s, respectively. Compared with state-of-the-art systems, SeDID offers better performance, which implies its potential to be applied in practice.Item Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking(Association for Computing Machinery (ACM), 2021-02) Yan, Zheng; Peng, Li; Feng, Wei; Yang, Laurence T.; Department of Communications and Networking; Network Security and Trust; Saint Francis Xavier University; Xidian UniversityPervasive Social Networking (PSN) supports online and instant social activities with the support of heterogeneous networks. Since reciprocal activities among both familiar/unfamiliar strangers and acquaintances are quite common in PSN, it is essential to offer trust information to PSN users. Past work normally evaluates trust based on a centralized party, which is not feasible due to the dynamic changes of PSN topology and its specific characteristics. The literature still lacks a decentralized trust evaluation scheme in PSN. In this article, we propose a novel blockchain-based decentralized system for trust evaluation in PSN, called Social-Chain. Considering mobile devices normally lack computing resources to process cryptographic puzzle calculation, we design a lightweight consensus mechanism based on Proof-of-Trust (PoT), which remarkably improves system effectivity compared with other blockchain systems. Serious security analysis and experimental results further illustrate the security and efficiency of Social-Chain for being feasibly applied into PSN.Item A Survey on Security, Privacy and Trust in Mobile Crowdsourcing(2018) Feng, Wei; Yan, Zheng; Zhang, Hengrun; Zeng, Kai; Xiao, Yu; Hou, Thomas; Department of Communications and Networking; Mobile Cloud Computing; George Mason University; Virginia Tech; Xidian UniversityWith the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses potential solutions. We analyze the characteristics of MCS, identify its security threats, and outline essential requirements on a secure, privacy-preserving and trustworthy MCS system. Further, we review existing solutions based on these requirements and compare their pros and cons. Finally, we point out open issues and propose some future research directionsItem TDL-Chain: An Intelligent Data Transmission Control System in Tactical Data Link Based on Blockchain(2020-11) Yang, Xuetao; Li, Yafeng; Feng, Wei; Chen, Liang; Yan, Zheng; Department of Communications and Networking; Network Security and Trust; Xidian University; China Electronics Technology Group CorporationTactical data link (TDL) is a wireless communication system that achieves instant, accurate, automatic, and secure data transmission in military scenarios. It greatly reduces the time of Observation, Orientation, Decision, and Action (OODA). Modern TDL systems utilize a distributed architecture to enhance anti-destruction capacity and support data transmission among different TDLs. However, it is difficult to ensure data consistency among TDLs, which greatly reduces joint combat capacities of TDLs. A data transmission control system that can offer data consistency among various TDLs is highly expected. Besides, data transmission in TDLs should be controlled in an automatic and intelligent way to satisfy the low latency requirement of modern wars. To tackle this problem, in this paper, we employ blockchain-based smart contracts to build up a decentralized data transmission control system for TDLs called TDL-Chain. TDL-Chain achieves automatic data transmission and guarantees information consistency among various combat entities. The evaluation based on proof-of-concept implementation demonstrates the effectiveness and efficiency of TDL-Chain.