Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Digital Signatures for Flows and Multicasts
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Graph-Based Authentication of Digital Streams
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Security Considerations in Space and Delay Tolerant Networks
SMC-IT '06 Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Delay-tolerant networking: an approach to interplanetary Internet
IEEE Communications Magazine
Hi-index | 0.00 |
We present SEGURA, a Bundle layer security extension for ensuring the authenticity and integrity of message bundles in Delay Tolerant Networks (DTNs). SEGURA employs probabilistic set membership constructs to amortize the cryptographic functionality of traditional authentication mechanisms such as Message Authentication Codes, Hash trees, authentication graphs, and digital signatures in relatively small sized data structures. Using probabilistic set membership constructs in the integrity verification process eliminates any form of dependency among individual network packets which gives the security protocol the capability of handling out of order packets and enduring high packet loss rates. This makes SEGURA a very suitable choice for operation in performance-challenged DTNs with highly disruptive natures featuring excessive disconnection rates, massive delays, and intermittent communication. Moreover, the SEGURA integrity enforcement mechanism gives intermediate DTN routers and gateways the ability to verify the integrity of bundles without employing expensive public-key operations. The goal here is to isolate the effects of any malicious attack as close as possible to the source of the attack. This results in the reduction of bogus network traffic and hence contributes to a major decrease in the messaging delay caused by distant packet retransmission.