Personal Satellite Services. 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers

Research Article

Providing Authentication in Delay/Disruption Tolerant Networking (DTN) Environment

Download
342 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-36787-8_23,
        author={Enyenihi Johnson and Haitham Cruickshank and Zhili Sun},
        title={Providing Authentication in Delay/Disruption Tolerant Networking (DTN) Environment},
        proceedings={Personal Satellite Services. 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers},
        proceedings_a={PSATS},
        year={2013},
        month={4},
        keywords={Security Delay/Disruption Tolerant Networking (DTN) Authentication Communication Satellite Traditional Cryptography (TC) Public Key Infrastructure (PKI)},
        doi={10.1007/978-3-642-36787-8_23}
    }
    
  • Enyenihi Johnson
    Haitham Cruickshank
    Zhili Sun
    Year: 2013
    Providing Authentication in Delay/Disruption Tolerant Networking (DTN) Environment
    PSATS
    Springer
    DOI: 10.1007/978-3-642-36787-8_23
Enyenihi Johnson1,*, Haitham Cruickshank1,*, Zhili Sun1,*
  • 1: University of Surrey
*Contact email: e.johnson@surrey.ac.uk, h.cruickshank@surrey.ac.uk, z.sun@surrey.ac.uk

Abstract

DTN environment is characterized by intermittent connectivity, high/variable delay, heterogeneity, high error rate and asymmetric data rate amongst others. These characteristics accounts for the poor behavior of Internet protocols in this environment. To address these problems, DTN was conceived and designed together with specialized protocols to carry out its services. Its emergence called for a new concept in security that was considered at the design stage. The main aim of this paper is to propose a traditional cryptography based authentication scheme that does not depend on network administrator’s availability during post network authentication communication and facilitates bundle processing by the recipient in the absence of connectivity. In this paper, we present and discuss the system model, the proposed credential and the propose authentication scheme. A simulation framework is developed for the implementation of the proposed and referenced schemes. From the simulation results, the proposed scheme was observed to be independent of network administrator’s availability during post network authentication communication and facilitates bundle processing in the absence of connectivity.