Personal Satellite Services. Second International ICST Confernce, PSATS 2010, Rome, Italy, February 2010 Revised Selected Papers

Research Article

ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks

Download
555 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-13618-4_19,
        author={Naveed Ahmad and Haitham Cruickshank and Zhili Sun},
        title={ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks},
        proceedings={Personal Satellite Services. Second International ICST Confernce, PSATS 2010, Rome, Italy, February 2010 Revised Selected Papers},
        proceedings_a={PSATS},
        year={2012},
        month={5},
        keywords={Delay Tolerant Network Security Identity Based Cryptography Anonymity Pseudonyms Public Key Cryptography},
        doi={10.1007/978-3-642-13618-4_19}
    }
    
  • Naveed Ahmad
    Haitham Cruickshank
    Zhili Sun
    Year: 2012
    ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
    PSATS
    Springer
    DOI: 10.1007/978-3-642-13618-4_19
Naveed Ahmad1,*, Haitham Cruickshank1,*, Zhili Sun1,*
  • 1: University of Surrey
*Contact email: n.ahmad@surrey.ac.uk, h.cruickshank@surrey.ac.uk, z.sun@surrey.ac.uk

Abstract

Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.