Research Article
ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
@INPROCEEDINGS{10.1007/978-3-642-13618-4_19, author={Naveed Ahmad and Haitham Cruickshank and Zhili Sun}, title={ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks}, proceedings={Personal Satellite Services. Second International ICST Confernce, PSATS 2010, Rome, Italy, February 2010 Revised Selected Papers}, proceedings_a={PSATS}, year={2012}, month={5}, keywords={Delay Tolerant Network Security Identity Based Cryptography Anonymity Pseudonyms Public Key Cryptography}, doi={10.1007/978-3-642-13618-4_19} }
- Naveed Ahmad
Haitham Cruickshank
Zhili Sun
Year: 2012
ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
PSATS
Springer
DOI: 10.1007/978-3-642-13618-4_19
Abstract
Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.