Hierarchical Identity Based Cryptography for End-to-End Security in DTNs

被引:15
|
作者
Patra, Rabin [1 ]
Surana, Sonesh [1 ]
Nedevschi, Sergiu [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
D O I
10.1109/ICCP.2008.4648376
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Delay Tolerant Networks (DTN) arise whenever traditional assumptions about today's Internet such as continuous end-to-end connectivity, low latencies and low error rates tire not applicable. These challenges impose constraints on the choice and implementation of possible security mechanisms in DTNs. The key requirements for a security architecture in DTNs include ensuring the protection of DTN infrastructure front unauthorized use as well as application protection by providing confidentiality, integrity and authentication services for end-to-end communication. In this paper, we examine the issues in providing application protection in DTNs and look at various possible mechanisms.. We then propose an architecture based on Hierarchical Identity Based Encryption (MBE) that provides end-to-end security services along with the ability to have fine-grained revocation and access control while at the same time ensuring efficient key management and distribution. We believe that a HIBE based mechanism would be much more efficient in dealing with the unique constraints of DTNs compared to standard public key mechanisms (PKI).
引用
收藏
页码:223 / 230
页数:8
相关论文
共 50 条
  • [31] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [32] On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
    Karame, Ghassan O.
    Danev, Boris
    Bannwart, Cyrill
    Capkun, Srdjan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 149 - 162
  • [33] The study on end-to-end security for ubiquitous commerce
    Chang, Hangbae
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 228 - 245
  • [34] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [35] The study on end-to-end security for ubiquitous commerce
    Hangbae Chang
    The Journal of Supercomputing, 2011, 55 : 228 - 245
  • [36] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
  • [37] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [38] Bluetooth Technology: ApXLgLevel End-to-End Security
    Rao, K. V. Bheemeswara
    Ravi, N.
    Bhushan, R. Phani
    Kumar, K. Pramod
    Venkataraman, S.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [39] Design of End-To-End Security for MQTT 5.0
    Chien, Hung-Yu
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 353 - 363
  • [40] Flexible End-to-End Content Security in CCN
    Wood, Christopher A.
    Uzun, Ersin
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,