
Research Article
ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
- @INPROCEEDINGS{10.1007/978-3-642-13618-4_19, author={Naveed Ahmad and Haitham Cruickshank and Zhili Sun}, title={ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks}, proceedings={Personal Satellite Services. Second International ICST Confernce, PSATS 2010, Rome, Italy, February 2010 Revised Selected Papers}, proceedings_a={PSATS}, year={2012}, month={5}, keywords={Delay Tolerant Network Security Identity Based Cryptography Anonymity Pseudonyms Public Key Cryptography}, doi={10.1007/978-3-642-13618-4_19} }
- Naveed Ahmad
 Haitham Cruickshank
 Zhili Sun
 Year: 2012
 ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
 PSATS
 Springer
 DOI: 10.1007/978-3-642-13618-4_19
Abstract
Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.


