An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Computer Security in the Real World
Computer
Proceedings of the 11th ACM conference on Computer and communications security
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Low-cost communication for rural internet kiosks using mechanical backhaul
Proceedings of the 12th annual international conference on Mobile computing and networking
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Very low-cost internet access using KioskNet
ACM SIGCOMM Computer Communication Review
Practical security for rural internet kiosks
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
Pervasive and Mobile Computing
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Robustness of DTN against routing attacks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Routing in socially selfish delay tolerant networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Design principles for robust opportunistic communication
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Design and implementation of the KioskNet system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
Journal of Network and Computer Applications
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
A transmission scheme for opportunistic networks with social selfish nodes
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
Resilience and security of opportunistic communications for emergency evacuation
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Security and Communication Networks
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Endpoints in a delay tolerant network (DTN) [5] must deal with long periods of disconnection, large end-to-end communication delays, and opportunistic communication over intermittent links. This makes traditional security mechanisms inefficient and sometimes unsuitable. We study three specific problems that arise naturally in this context: initiation of a secure channel by a disconnected user using an opportunistic connection, mutual authentication over an opportunistic link, and protection of disconnected users from attacks initiated by compromised identities. We propose a security architecture for DTN based on Hierarchical Identity Based Cryptography (HIBC) that provides efficient and practical solutions to these problems.