Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

Research Article

Delay-Tolerant Network Based Secure Transmission System Design

  • @INPROCEEDINGS{10.1007/978-3-319-69605-8_21,
        author={Gang Ming and Zhenxiang Chen},
        title={Delay-Tolerant Network Based Secure Transmission System Design},
        proceedings={Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25--26, and December 15--16, 2016, Proceedings},
        proceedings_a={CLOUDCOMP},
        year={2017},
        month={11},
        keywords={Delay-tolerant network Identity-based cryptography Identity-based encryption Secure transmission system},
        doi={10.1007/978-3-319-69605-8_21}
    }
    
  • Gang Ming
    Zhenxiang Chen
    Year: 2017
    Delay-Tolerant Network Based Secure Transmission System Design
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-319-69605-8_21
Gang Ming1, Zhenxiang Chen,*
  • 1: University of Jinan
*Contact email: czx@ujn.edu.cn

Abstract

The Internet has been a great success but its architecture need relatively complete infrastructure construction to implement and operate. Especially, the situation worsens on resource-limited devices, so delay-tolerant network was proposed to overcome these disadvantages. The development of delay-tolerant network provides a new approach to transmit data but its confidentiality and integrity cannot be guaranteed well. The public-key cryptography provides a feasible mechanism to protect data. However, the maintenance cost of certificate authorities is large. Identity-based cryptography allows users to encrypt message with their identity information. Based on the above-mentioned technologies, we proposed a secure transmission system based on delay-tolerant network and identity-based cryptography, which does not rely on traditional key distribution mechanism and simplifies identity verification.