Abstract
Protected, low-overhead key establishment is vital to maintain the high level of confidence and security for Delay Tolerant Networks (DTNs). A few works presenting solutions to DTN key establishment have concentrated principally on targeted networking atmospheres. In this work, to deal with the key establishment concern for Bundle Protocol (BP), a time-evolving topology model and two-channel cryptography are formulated to design well-organized and non-interactive multilevel key exchange protocol. A time-evolving model is employed to properly model the periodic and fixed behaviour patterns of space DTNs, and consequently a node can plan when and to whom it should transmit its public key. In the meantime, the application of two-channel cryptography allows DTN nodes to exchange their public keys or revocation position information, with authentication assurance and in a non-interactive approach. This approach facilitates to set up a secure block to maintain BSP, tolerating huge delays, and unanticipated loss of connectivity of space DTNs. The experimental investigation reveals the security enforcement and provides enhancement in performance for DTN network maintenance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Voyiatzis, A.G.: A survey of delay – disruption tolerant networking applications. J. Internet Eng. 5(1), 331–343 (2012)
Farrell, S., Symington, S., Weiss, H., Lovell, P.: Delay-tolerant networking security overview. In: IETF Internet Draft (2009). draft-irtf-dtnrg-sec-overview-06.txt
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. In: IETF Internet Draft (2010). draft-irtf-dtnrg-bundle-security-15.txt
Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: Second IEEE International Conference on Space Mission Challenges for Information Technology (2006)
Jia, Z., Lin, X., Tan, S.H., Li, L., Yang, Y.: Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905–913 (2012)
Basha, J.A., Mozhi, D.A.: Detection of misbehaviour activities in delay tolerant network using trust authority. IJEDR 2(2), 1864–1868 (2014)
Johari, R., Gupta, N.: Secure query processing in delay tolerant network using Java cryptography architecture. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657. IEEE (2011)
Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: 5th Symposium on Usable Privacy, pp. 1–12 (2009)
Huang, M., Chen, S., Zhu, Y., Wang, Y.: Cost-efficient topology design problem in time evolving delay-tolerant networks. In: IEEE Global Telecommunication, p. 15 (2010)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.: Talking to strangers: authentication in ad-hoc wireless networks. In: 9th Annual NDSS, pp. 7–19 (2002)
Mashatan, A., Stinson, D.: Practical unconditionally secure two-channel message authentication. Des. Codes Cryptogr. 55(2), 169–188 (2001)
Fall, K.: A delay-tolerant network architecture for challenged internets. In: SIGCOMM 2003, Karlsruhe, Germany, 25–29 August 2003
Acknowledgement
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (Ministry of Science, ICT & Future Planning) (NO. 2016R1A2B4013118).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kang, J., Joe, I. (2018). Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_189
Download citation
DOI: https://doi.org/10.1007/978-981-10-7605-3_189
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7604-6
Online ISBN: 978-981-10-7605-3
eBook Packages: EngineeringEngineering (R0)