Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Pervasive and Mobile Computing
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
An opportunistic batch bundle authentication scheme for energy constrained DTNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Floating content for probabilistic information sharing
Pervasive and Mobile Computing
Security and Communication Networks
A store-carry-process-and-forward paradigm for intelligent sensor grids
Information Sciences: an International Journal
Hi-index | 0.00 |
Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We analyze the applicability of IBC in this context and conclude that for authentication and integrity, IBC has no significant advantage over traditional cryptography, but it can indeed enable better ways of providing confidentiality. Additionally, we show a way of bootstrapping the needed security associations for IBC use from an existing authentication infrastructure.