Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks
Protected, low-overhead key establishment is vital to maintain the high level of confidence and security for Delay Tolerant Networks (DTNs). A few works presenting solutions to DTN key establishment have concentrated principally on targeted networking atmospheres. In this work, to deal with the key establishment concern for Bundle Protocol (BP), a time-evolving topology model and two-channel cryptography are formulated to design well-organized and non-interactive multilevel key exchange protocol. A time-evolving model is employed to properly model the periodic and fixed behaviour patterns of space DTNs, and consequently a node can plan when and to whom it should transmit its public key. In the meantime, the application of two-channel cryptography allows DTN nodes to exchange their public keys or revocation position information, with authentication assurance and in a non-interactive approach. This approach facilitates to set up a secure block to maintain BSP, tolerating huge delays, and unanticipated loss of connectivity of space DTNs. The experimental investigation reveals the security enforcement and provides enhancement in performance for DTN network maintenance.
KeywordsBundle authentication Cryptographic controls Key establishment Space-time based delay tolerant networks
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (Ministry of Science, ICT & Future Planning) (NO. 2016R1A2B4013118).
- 1.Voyiatzis, A.G.: A survey of delay – disruption tolerant networking applications. J. Internet Eng. 5(1), 331–343 (2012)Google Scholar
- 2.Farrell, S., Symington, S., Weiss, H., Lovell, P.: Delay-tolerant networking security overview. In: IETF Internet Draft (2009). draft-irtf-dtnrg-sec-overview-06.txt
- 3.Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. In: IETF Internet Draft (2010). draft-irtf-dtnrg-bundle-security-15.txt
- 4.Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: Second IEEE International Conference on Space Mission Challenges for Information Technology (2006)Google Scholar
- 6.Basha, J.A., Mozhi, D.A.: Detection of misbehaviour activities in delay tolerant network using trust authority. IJEDR 2(2), 1864–1868 (2014)Google Scholar
- 7.Johari, R., Gupta, N.: Secure query processing in delay tolerant network using Java cryptography architecture. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657. IEEE (2011)Google Scholar
- 8.Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: 5th Symposium on Usable Privacy, pp. 1–12 (2009)Google Scholar
- 9.Huang, M., Chen, S., Zhu, Y., Wang, Y.: Cost-efficient topology design problem in time evolving delay-tolerant networks. In: IEEE Global Telecommunication, p. 15 (2010)Google Scholar
- 10.Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.: Talking to strangers: authentication in ad-hoc wireless networks. In: 9th Annual NDSS, pp. 7–19 (2002)Google Scholar
- 12.Fall, K.: A delay-tolerant network architecture for challenged internets. In: SIGCOMM 2003, Karlsruhe, Germany, 25–29 August 2003Google Scholar