Hierarchical Identity Based Cryptography for End-to-End Security in DTNs

被引:15
|
作者
Patra, Rabin [1 ]
Surana, Sonesh [1 ]
Nedevschi, Sergiu [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
D O I
10.1109/ICCP.2008.4648376
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Delay Tolerant Networks (DTN) arise whenever traditional assumptions about today's Internet such as continuous end-to-end connectivity, low latencies and low error rates tire not applicable. These challenges impose constraints on the choice and implementation of possible security mechanisms in DTNs. The key requirements for a security architecture in DTNs include ensuring the protection of DTN infrastructure front unauthorized use as well as application protection by providing confidentiality, integrity and authentication services for end-to-end communication. In this paper, we examine the issues in providing application protection in DTNs and look at various possible mechanisms.. We then propose an architecture based on Hierarchical Identity Based Encryption (MBE) that provides end-to-end security services along with the ability to have fine-grained revocation and access control while at the same time ensuring efficient key management and distribution. We believe that a HIBE based mechanism would be much more efficient in dealing with the unique constraints of DTNs compared to standard public key mechanisms (PKI).
引用
收藏
页码:223 / 230
页数:8
相关论文
共 50 条
  • [1] DEVICE IDENTITY MANAGEMENT AND END-TO-END SECURITY
    Latour, Jacques
    D'Souza, Natasha
    IEEE NETWORK, 2021, 35 (05): : 8 - 9
  • [2] An efficient identity-based cryptosystem for end-to-end mobile security
    Hwu, Jing-Shyang
    Chen, Rong-Jaye
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2586 - 2593
  • [3] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [4] An end-to-end cryptography based real-time chat
    Melo, Tiezer
    Barros, Antonio
    Antunes, Mario
    Frazao, Luis
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [5] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [6] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [7] An adaptive end-to-end RTO calculation framework for DTNs with scheduled connectivity
    Diamantopoulos, Sotiris
    Bezirgiannidis, Nikolaos
    Papastergiou, Giorgos
    Tsaoussidis, Vassilis
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2018, 36 (03) : 277 - 295
  • [8] Hierarchical end-to-end service recovery
    El-Darieby, M
    Petriu, D
    Rolia, J
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 649 - 661
  • [9] An end-to-end systems approach to elliptic curve cryptography
    Gura, N
    Shantz, SC
    Eberle, H
    Gupta, S
    Gupta, V
    Finchelstein, D
    Goupy, E
    Stebila, D
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 349 - 365
  • [10] Code-Based Cryptography for Confidential Inference on FPGAs: An End-to-End Methodology
    Karn, Rupesh Raj
    Knechtel, Johann
    Sinanoglu, Ozgur
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,