Advertisement

ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks

  • Naveed Ahmad
  • Haitham Cruickshank
  • Zhili Sun
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 43)

Abstract

Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.

Keywords

Delay Tolerant Network Security Identity Based Cryptography Anonymity Pseudonyms Public Key Cryptography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cerf, V., et al.: Delay Tolerant Networking Architecture. IETF, Network Working Group, RFC 4838 (2007)Google Scholar
  2. 2.
    Fall, K.: A Delay Tolerant Network for Challenging Internet. In: SIGCOMM 2003 Conference on Application, Technologies, Architecture and Protocol for Computer communication, pp. 27–34 (2003)Google Scholar
  3. 3.
    Warthman, F.: A Tutorial Delay Tolerant Networks (DTNs). V 1.1, DTNRG (2003)Google Scholar
  4. 4.
    Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF, Network Working Group, RFC 5050 (2007)Google Scholar
  5. 5.
    Farrell, S., Cahill, V.: Security consideration in space and delay tolerant networks. In: Second IEEE international conference, Space mission challenges for information technology, SMC-IT (2006)Google Scholar
  6. 6.
    Fall, K., Chakrabarthi, A.: Identity Based Cryptography for Delay Tolerant Networking (2003), http://edify.cse.lehigh.edu/EdifyTeam/edifyTeamDocs/dtn_sec.pdf
  7. 7.
    Symington, S.F., et al.: Bundle Security Protocol Specification. draft-irtf-dtnrg-bundle-security-08, IETF draft (2008)Google Scholar
  8. 8.
    Farrell, S., et al.: Delay-Tolerant Networking Security Overview. draft-irtf-dtnrg-sec-overview-06, IETF draft (2009)Google Scholar
  9. 9.
    Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)Google Scholar
  10. 10.
    Farrell, S., Cahill, V.: Delay and Disruption Tolerant Network (2006), ISBN. 1-59693-063-2Google Scholar
  11. 11.
    Weise, J.: Public Key Infrastructure Overview. Sun Blue Prints (2001)Google Scholar
  12. 12.
    Asokan, N., et al.: Applicability of Identity Based Cryptography in Disruption Tolerant Network. In: 1st international MobiSys workshop on mobile oppurtunistics networking, MobiOpp 2007, pp. 52–56 (2007)Google Scholar
  13. 13.
    Shamir, A.: Identity based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  14. 14.
    Gagne, M.: Identity based encryption: A survey. RSA Labortries, Cryptobytes 6 (2003)Google Scholar
  15. 15.
    Baek, J., et al.: A survey of Identity based cryptography. In: Proc. of Australian Unix Users Group Annual Conference (2004)Google Scholar
  16. 16.
    Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 213–229. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  17. 17.
    Seth, A., Keshav, S.: Particle security for disconnected nodes. In: First workshop on Secure Network Protocols (NPSec), pp. 31–36 (2005)Google Scholar
  18. 18.
    Farrell, S., Symington, S., Weiss, H.: Delay Tolerant Network Security overview. Draft-irtf-dtnrg-sec-overview-08, IRTF (2008)Google Scholar
  19. 19.
    Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity and identity management- A consolidated proposal for terminology (2008), http://dud.inf.tudresden.de/AnonTerminology.shtml
  20. 20.
    Chaum, D.: Untraceable electronic email, return address and digital pseudonym. Communication of the ACM (1981)Google Scholar
  21. 21.
    Reed, M.G., et al.: Anonymous connection and onion routing. IEEE journal on selected areas in communication, 482–494 (1998)Google Scholar
  22. 22.
    Danezis, G., Diaz, C.: A survey of anonymous communication channels. Journal of Privacy technology (2008)Google Scholar
  23. 23.
    Kate, A., et al.: Anonymity and security in delay tolerant networks. In: third international conference on security and privacy, SecureComm 2007 (2007)Google Scholar
  24. 24.
    Lynn, B.: Paring Based Cryptography (PBC) library, http://crypto.stanford.edu/pbc/
  25. 25.
    DTN Research group, http://www.dtnrg.org/wiki/Code

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Naveed Ahmad
    • 1
  • Haitham Cruickshank
    • 1
  • Zhili Sun
    • 1
  1. 1.Center for Communication Systems ResearchUniversity of SurreyGuildfordUK

Personalised recommendations