Advertisement

Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks

  • Jinyeong Kang
  • Inwhee Joe
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

Protected, low-overhead key establishment is vital to maintain the high level of confidence and security for Delay Tolerant Networks (DTNs). A few works presenting solutions to DTN key establishment have concentrated principally on targeted networking atmospheres. In this work, to deal with the key establishment concern for Bundle Protocol (BP), a time-evolving topology model and two-channel cryptography are formulated to design well-organized and non-interactive multilevel key exchange protocol. A time-evolving model is employed to properly model the periodic and fixed behaviour patterns of space DTNs, and consequently a node can plan when and to whom it should transmit its public key. In the meantime, the application of two-channel cryptography allows DTN nodes to exchange their public keys or revocation position information, with authentication assurance and in a non-interactive approach. This approach facilitates to set up a secure block to maintain BSP, tolerating huge delays, and unanticipated loss of connectivity of space DTNs. The experimental investigation reveals the security enforcement and provides enhancement in performance for DTN network maintenance.

Keywords

Bundle authentication Cryptographic controls Key establishment Space-time based delay tolerant networks 

Notes

Acknowledgement

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (Ministry of Science, ICT & Future Planning) (NO. 2016R1A2B4013118).

References

  1. 1.
    Voyiatzis, A.G.: A survey of delay – disruption tolerant networking applications. J. Internet Eng. 5(1), 331–343 (2012)Google Scholar
  2. 2.
    Farrell, S., Symington, S., Weiss, H., Lovell, P.: Delay-tolerant networking security overview. In: IETF Internet Draft (2009). draft-irtf-dtnrg-sec-overview-06.txt
  3. 3.
    Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. In: IETF Internet Draft (2010). draft-irtf-dtnrg-bundle-security-15.txt
  4. 4.
    Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: Second IEEE International Conference on Space Mission Challenges for Information Technology (2006)Google Scholar
  5. 5.
    Jia, Z., Lin, X., Tan, S.H., Li, L., Yang, Y.: Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905–913 (2012)CrossRefGoogle Scholar
  6. 6.
    Basha, J.A., Mozhi, D.A.: Detection of misbehaviour activities in delay tolerant network using trust authority. IJEDR 2(2), 1864–1868 (2014)Google Scholar
  7. 7.
    Johari, R., Gupta, N.: Secure query processing in delay tolerant network using Java cryptography architecture. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657. IEEE (2011)Google Scholar
  8. 8.
    Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: 5th Symposium on Usable Privacy, pp. 1–12 (2009)Google Scholar
  9. 9.
    Huang, M., Chen, S., Zhu, Y., Wang, Y.: Cost-efficient topology design problem in time evolving delay-tolerant networks. In: IEEE Global Telecommunication, p. 15 (2010)Google Scholar
  10. 10.
    Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.: Talking to strangers: authentication in ad-hoc wireless networks. In: 9th Annual NDSS, pp. 7–19 (2002)Google Scholar
  11. 11.
    Mashatan, A., Stinson, D.: Practical unconditionally secure two-channel message authentication. Des. Codes Cryptogr. 55(2), 169–188 (2001)MathSciNetzbMATHGoogle Scholar
  12. 12.
    Fall, K.: A delay-tolerant network architecture for challenged internets. In: SIGCOMM 2003, Karlsruhe, Germany, 25–29 August 2003Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer and SoftwareHanyang UniversitySeoulSouth Korea

Personalised recommendations