Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1755743.1755758acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Secure descriptive message dissemination in DTNs

Published: 22 February 2010 Publication History

Abstract

Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. A key feature of DTN technology is the late-binding capability that allows messages destined to a descriptive name to be resolved progressively until the messages are delivered to one or several recipients. In this paper, we describe a flexible security solution that allows messages destined to descriptive names to be sent securely such that unauthorized personnel is not allowed to eavesdrop on them. Our solution builds on the attributed based cryptography system. In addition, we describe our implementation of a late-binding router that supports our security solution. We also present our prototyping experience.

References

[1]
K. Fall, "A delay tolerant network architecture for challenged networks", Proceedings of ACM Sigcomm, 2003.
[2]
V. Cerf et al, "Delay Tolerant Networking Architecture", RFC4838, April 2007
[3]
W Adjie-Winoto, E. Schwartz, H. Balakrishnan, "The design and implementation of an intentional naming system", Proceedings of ACM SOSP, Dec 1999
[4]
R. Krishnan et al, "The SPINDLE Disruption Tolerant Networking System", Proceedings of IEEE Milcom, 2007
[5]
P. Basu, R. Krishnan, D. W. Brown, "Persistent Delivery with Deferred Binding to Descriptively Named Destinations", Proceedings of IEEE Milcom, 2008.
[6]
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Masurra, K. Sezaki, "CARAVAN -- providing location privacy for VANET", Proceedings of Embedded Security in CARs (ESCAR), 2005.
[7]
J. Guo, J. P. Baugh, S. Wang, "A group signature based secure and privacy preserving vehicular communication framework", Proceeding of Mobile Networking for Vehicular Environments (MOVE), pp 103--108, 2007.
[8]
V. Goyal et al, "Attribute-Based Encryption for fine-grained access control of encrypted data", Proceedings of ACM CCS, pp 89--98, 2006
[9]
J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-policy attribute-based encryption", Proceedings of 28th IEEE Sympoisum on Security and Privacy, 2007
[10]
D. Boneh, M. Franklin, "Identity Based Encryption from the weil pairing", Proceedings of Crypto 01, Springer-Verlag, 2001
[11]
A. Shamir, "How to share a secret", Communications of the ACM, 22(11), pp 612--613, 1979
[12]
M. Demmer, "DTN Reference Implementation, Version 2", URL http://www.dtnrg.org
[13]
K. Scott, S. Burleigh, "Bundle Protocol Specification", RFC 5050, Nov, 2007
[14]
S. Symington, "Delay-Tolerant Networking Metadata Extension Block", draft-symington=-dtnrg-bundle-metadata-blcok-01, work in progress, Feb, 2008
[15]
S. Symington, F Farrell, H. Weiss, P. Lovell, "Bundle Security Protocol Specification", draft-irtf-dtnrg-bundle-security-05 (work in progress), Feb, 2008.
[16]
S. Roy, M. Chuah, "Secure Data Retrieval Based on Ciphertext-Based Attribute Based Encryption System for Disruption Tolerant Networks", Lehigh CSE Technical Report, May, 2009. http://www.cse.lehigh.edu/~chuah/publications/cpabe_report09.pdf
[17]
A. Balasubramanian, B Levine, A. Venkataramani, "DTN Routing as a Resource Allocation Problem", Proceedings of ACM Sigcomm, Aug, 2007.
[18]
X. Hong, D. Huang, M. Gerla, Z. Gao, "SAT: situation-aware trust architecture for vehicular networks", Proceedings of ACM Mobiarch, 2008.
[19]
D. Boneh, C. Gentry, B. Waters, "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys", Proceedings of Crypto, 2005, LNCS 3621, pp 258--275, 2005.
[20]
SUNY Stony Brook, "XSB Logic Programming and Deductive Data Base System", http://xsb.sourceforge.net.
[21]
B. Lynn. The pairing-based library http://crypto.stanford.edu/pbc

Cited By

View all
  • (2017)A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based EncryptionJournal of Information Processing10.2197/ipsjjip.25.23425(234-243)Online publication date: 2017
  • (2017)Encrypting data to pervasive contexts2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PERCOM.2017.7917877(309-315)Online publication date: Mar-2017
  • (2015)Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption2015 International Electronics Symposium (IES)10.1109/ELECSYM.2015.7380829(134-139)Online publication date: Sep-2015
  • Show More Cited By

Index Terms

  1. Secure descriptive message dissemination in DTNs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiOpp '10: Proceedings of the Second International Workshop on Mobile Opportunistic Networking
      February 2010
      229 pages
      ISBN:9781605589251
      DOI:10.1145/1755743
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 February 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. descriptive message delivery
      2. disruption tolerant networks
      3. security

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      MobiOpp' 10
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based EncryptionJournal of Information Processing10.2197/ipsjjip.25.23425(234-243)Online publication date: 2017
      • (2017)Encrypting data to pervasive contexts2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PERCOM.2017.7917877(309-315)Online publication date: Mar-2017
      • (2015)Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption2015 International Electronics Symposium (IES)10.1109/ELECSYM.2015.7380829(134-139)Online publication date: Sep-2015
      • (2015)An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based EncryptionProceedings of the 2015 Third International Symposium on Computing and Networking (CANDAR)10.1109/CANDAR.2015.23(470-476)Online publication date: 8-Dec-2015
      • (2014)DemoProceedings of the 2014 workshop on Mobile augmented reality and robotic technology-based systems10.1145/2609829.2609831(15-16)Online publication date: 11-Jun-2014
      • (2014)An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based EncryptionProceedings of the 2014 Second International Symposium on Computing and Networking10.1109/CANDAR.2014.34(536-542)Online publication date: 10-Dec-2014
      • (2013)Lehigh ExplorerProceedings of the 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks10.1109/MSN.2013.43(33-40)Online publication date: 11-Dec-2013
      • (2013)An Efficient and Anonymous Attribute-Based group setup scheme2013 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2013.6831181(861-866)Online publication date: Dec-2013
      • (2011)GSTARProceedings of the sixth international workshop on MobiArch10.1145/1999916.1999922(19-24)Online publication date: 28-Jun-2011
      • (2011)Gateway-based interdomain routing scheme for intentional named message delivery in Disruption Tolerant Networks2011 - MILCOM 2011 Military Communications Conference10.1109/MILCOM.2011.6127597(1934-1939)Online publication date: Nov-2011
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media