Hierarchical Identity Based Cryptography for End-to-End Security in DTNs

被引:15
|
作者
Patra, Rabin [1 ]
Surana, Sonesh [1 ]
Nedevschi, Sergiu [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
D O I
10.1109/ICCP.2008.4648376
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Delay Tolerant Networks (DTN) arise whenever traditional assumptions about today's Internet such as continuous end-to-end connectivity, low latencies and low error rates tire not applicable. These challenges impose constraints on the choice and implementation of possible security mechanisms in DTNs. The key requirements for a security architecture in DTNs include ensuring the protection of DTN infrastructure front unauthorized use as well as application protection by providing confidentiality, integrity and authentication services for end-to-end communication. In this paper, we examine the issues in providing application protection in DTNs and look at various possible mechanisms.. We then propose an architecture based on Hierarchical Identity Based Encryption (MBE) that provides end-to-end security services along with the ability to have fine-grained revocation and access control while at the same time ensuring efficient key management and distribution. We believe that a HIBE based mechanism would be much more efficient in dealing with the unique constraints of DTNs compared to standard public key mechanisms (PKI).
引用
收藏
页码:223 / 230
页数:8
相关论文
共 50 条
  • [41] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [42] An end-to-end home network security framework
    Tak, S
    Dixit, S
    Park, EK
    COMPUTER COMMUNICATIONS, 2004, 27 (05) : 412 - 422
  • [43] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [44] End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES-RSA) Cryptography
    Devi, V. Anusuya
    Sampradeepraj, T.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (03) : 1675 - 1703
  • [45] Hierarchical convolutional features for end-to-end representation-based visual tracking
    Suguo Zhu
    Zhenying Fang
    Fei Gao
    Machine Vision and Applications, 2018, 29 : 955 - 963
  • [46] A hierarchical and parallel framework for End-to-End Aspect-based Sentiment Analysis
    Xiao, Ding
    Ren, Feiyang
    Pang, Xiaoxuan
    Cai, Ming
    Wang, Qianyu
    He, Ming
    Peng, Jiawei
    Fu, Hao
    NEUROCOMPUTING, 2021, 465 : 549 - 560
  • [47] Hierarchical convolutional features for end-to-end representation-based visual tracking
    Zhu, Suguo
    Fang, Zhenying
    Gao, Fei
    MACHINE VISION AND APPLICATIONS, 2018, 29 (06) : 955 - 963
  • [48] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [49] End-to-End Entity Linking with Hierarchical Reinforcement Learning
    Chen, Lihan
    Zhu, Tinghui
    Liu, Jingping
    Liang, Jiaqing
    Xiao, Yanghua
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 4, 2023, : 4173 - 4181
  • [50] Hierarchical Identity Based Cryptography For Security and Trust in Named Data Networking
    Hamdane, Balkis
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    El Fatmi, Sihem Guemara
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 226 - 231