Hierarchical Identity Based Cryptography for End-to-End Security in DTNs

被引:15
|
作者
Patra, Rabin [1 ]
Surana, Sonesh [1 ]
Nedevschi, Sergiu [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
D O I
10.1109/ICCP.2008.4648376
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Delay Tolerant Networks (DTN) arise whenever traditional assumptions about today's Internet such as continuous end-to-end connectivity, low latencies and low error rates tire not applicable. These challenges impose constraints on the choice and implementation of possible security mechanisms in DTNs. The key requirements for a security architecture in DTNs include ensuring the protection of DTN infrastructure front unauthorized use as well as application protection by providing confidentiality, integrity and authentication services for end-to-end communication. In this paper, we examine the issues in providing application protection in DTNs and look at various possible mechanisms.. We then propose an architecture based on Hierarchical Identity Based Encryption (MBE) that provides end-to-end security services along with the ability to have fine-grained revocation and access control while at the same time ensuring efficient key management and distribution. We believe that a HIBE based mechanism would be much more efficient in dealing with the unique constraints of DTNs compared to standard public key mechanisms (PKI).
引用
收藏
页码:223 / 230
页数:8
相关论文
共 50 条
  • [21] End-to-End Hierarchical Fuzzy Inference Solution
    Mutlu, Begum
    Sezer, Ebru A.
    Akcayol, M. Ali
    2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2018,
  • [22] END-TO-END HIERARCHICAL LANGUAGE IDENTIFICATION SYSTEM
    Irtza, Saad
    Sethu, Vidhyasaharan
    Ambikairajah, Eliathamby
    Li, Haizhou
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 5199 - 5203
  • [23] End-to-End Ultrametric Learning for Hierarchical Segmentation
    Lapertot, Raphael
    Chierchia, Giovanni
    Perret, Benjamin
    DISCRETE GEOMETRY AND MATHEMATICAL MORPHOLOGY, DGMM 2024, 2024, 14605 : 286 - 297
  • [24] A Hierarchical Temporal Memory Based End-to-End Autonomous Driving System
    Le Mero, Luc
    Dianati, Mehrdad
    Lee, Graham
    Journal of Autonomous Vehicles and Systems, 2022, 2 (04):
  • [25] Hierarchical inference of unicast network topologies based on end-to-end measurements
    Shih, Meng-Fu
    Hero, Alfred O., III
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (05) : 1708 - 1718
  • [26] End-to-end simulation of Hierarchical Fringe Tracking
    Allouche, Fatme
    Hadjara, Massinissa
    Berdja, Amokrane
    Boskri, Abdelkarim
    Leftley, James
    Lagarde, Stephane
    Petrova, Romain G.
    OPTICAL AND INFRARED INTERFEROMETRY AND IMAGING IX, 2024, 13095
  • [27] End-to-End Privacy for Identity & Location with IP
    Bhatti, Saleem N.
    Haywood, Gregor
    Yanagida, Ryo
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [28] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [29] Sizzle: A standards based end-to-end security architecture for the embedded Internet
    Gupta, V
    Millard, M
    Fung, S
    Zhu, Y
    Gura, N
    Eberle, H
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 247 - 256
  • [30] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,