About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Conference on Security and Privacy in Communication Networks

Research Article

Anonymity and Security in Delay Tolerant Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550373,
        author={Aniket Kate and Gregory M. Zaverucha and Urs Hengartner},
        title={Anonymity and Security in Delay Tolerant Networks},
        proceedings={3rd International ICST Conference on Security and Privacy in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2008},
        month={6},
        keywords={Authentication  Data security  Disruption tolerant networking  Identity-based encryption  Internet  Privacy  Public key  Public key cryptography  Road transportation  Telemedicine},
        doi={10.1109/SECCOM.2007.4550373}
    }
    
  • Aniket Kate
    Gregory M. Zaverucha
    Urs Hengartner
    Year: 2008
    Anonymity and Security in Delay Tolerant Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOM.2007.4550373
Aniket Kate1,*, Gregory M. Zaverucha1,*, Urs Hengartner1,*
  • 1: David R. Cheriton School of Computer Science University of Waterloo Waterloo ON, N2L 3G1, Canada
*Contact email: akate@cs.uwaterloo.ca, gzaveruc@cs.uwaterloo.ca, uhengart@cs.uwaterloo.ca

Abstract

A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which provide Internet connectivity to rural areas in developing regions using conventional transportation mediums, like buses. Potential applications of these rural area DTNs are e-governance, telemedicine and citizen journalism. Therefore, security and privacy are critical for DTNs. Traditional cryptographic techniques based on PKI-certified public keys assume continuous network access, which makes these techniques inapplicable to DTNs. We present the first anonymous communication solution for DTNs and introduce a new anonymous authentication protocol as a part of it. Furthermore, we present a security infrastructure for DTNs to provide efficient secure communication based on identitybased cryptography. We show that our solutions have better performance than existing security infrastructures for DTNs.

Keywords
Authentication Data security Disruption tolerant networking Identity-based encryption Internet Privacy Public key Public key cryptography Road transportation Telemedicine
Published
2008-06-24
Publisher
IEEE
Modified
2011-08-04
http://dx.doi.org/10.1109/SECCOM.2007.4550373
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL