The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Communications of the ACM
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
SAT: situation-aware trust architecture for vehicular networks
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
GSTAR: generalized storage-aware routing for mobilityfirst in the future mobile internet
MobiArch '11 Proceedings of the sixth international workshop on MobiArch
Hi-index | 0.00 |
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. A key feature of DTN technology is the late-binding capability that allows messages destined to a descriptive name to be resolved progressively until the messages are delivered to one or several recipients. In this paper, we describe a flexible security solution that allows messages destined to descriptive names to be sent securely such that unauthorized personnel is not allowed to eavesdrop on them. Our solution builds on the attributed based cryptography system. In addition, we describe our implementation of a late-binding router that supports our security solution. We also present our prototyping experience.