Skip to main content

Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks

  • Conference paper
  • First Online:
Book cover Advances in Computer Science and Ubiquitous Computing (CUTE 2017, CSA 2017)

Abstract

Protected, low-overhead key establishment is vital to maintain the high level of confidence and security for Delay Tolerant Networks (DTNs). A few works presenting solutions to DTN key establishment have concentrated principally on targeted networking atmospheres. In this work, to deal with the key establishment concern for Bundle Protocol (BP), a time-evolving topology model and two-channel cryptography are formulated to design well-organized and non-interactive multilevel key exchange protocol. A time-evolving model is employed to properly model the periodic and fixed behaviour patterns of space DTNs, and consequently a node can plan when and to whom it should transmit its public key. In the meantime, the application of two-channel cryptography allows DTN nodes to exchange their public keys or revocation position information, with authentication assurance and in a non-interactive approach. This approach facilitates to set up a secure block to maintain BSP, tolerating huge delays, and unanticipated loss of connectivity of space DTNs. The experimental investigation reveals the security enforcement and provides enhancement in performance for DTN network maintenance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Voyiatzis, A.G.: A survey of delay – disruption tolerant networking applications. J. Internet Eng. 5(1), 331–343 (2012)

    Google Scholar 

  2. Farrell, S., Symington, S., Weiss, H., Lovell, P.: Delay-tolerant networking security overview. In: IETF Internet Draft (2009). draft-irtf-dtnrg-sec-overview-06.txt

  3. Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. In: IETF Internet Draft (2010). draft-irtf-dtnrg-bundle-security-15.txt

  4. Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: Second IEEE International Conference on Space Mission Challenges for Information Technology (2006)

    Google Scholar 

  5. Jia, Z., Lin, X., Tan, S.H., Li, L., Yang, Y.: Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905–913 (2012)

    Article  Google Scholar 

  6. Basha, J.A., Mozhi, D.A.: Detection of misbehaviour activities in delay tolerant network using trust authority. IJEDR 2(2), 1864–1868 (2014)

    Google Scholar 

  7. Johari, R., Gupta, N.: Secure query processing in delay tolerant network using Java cryptography architecture. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657. IEEE (2011)

    Google Scholar 

  8. Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: 5th Symposium on Usable Privacy, pp. 1–12 (2009)

    Google Scholar 

  9. Huang, M., Chen, S., Zhu, Y., Wang, Y.: Cost-efficient topology design problem in time evolving delay-tolerant networks. In: IEEE Global Telecommunication, p. 15 (2010)

    Google Scholar 

  10. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.: Talking to strangers: authentication in ad-hoc wireless networks. In: 9th Annual NDSS, pp. 7–19 (2002)

    Google Scholar 

  11. Mashatan, A., Stinson, D.: Practical unconditionally secure two-channel message authentication. Des. Codes Cryptogr. 55(2), 169–188 (2001)

    MathSciNet  MATH  Google Scholar 

  12. Fall, K.: A delay-tolerant network architecture for challenged internets. In: SIGCOMM 2003, Karlsruhe, Germany, 25–29 August 2003

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (Ministry of Science, ICT & Future Planning) (NO. 2016R1A2B4013118).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Inwhee Joe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kang, J., Joe, I. (2018). Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_189

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7605-3_189

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7604-6

  • Online ISBN: 978-981-10-7605-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics