3rd International ICST Conference on Security and Privacy in Communication Networks

Research Article

Anonymity and Security in Delay Tolerant Networks

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550373,
        author={Aniket Kate and Gregory M. Zaverucha and Urs Hengartner},
        title={Anonymity and Security in Delay Tolerant Networks},
        proceedings={3rd International ICST Conference on Security and Privacy in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2008},
        month={6},
        keywords={Authentication  Data security  Disruption tolerant networking  Identity-based encryption  Internet  Privacy  Public key  Public key cryptography  Road transportation  Telemedicine},
        doi={10.1109/SECCOM.2007.4550373}
    }
    
  • Aniket Kate
    Gregory M. Zaverucha
    Urs Hengartner
    Year: 2008
    Anonymity and Security in Delay Tolerant Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOM.2007.4550373
Aniket Kate1,*, Gregory M. Zaverucha1,*, Urs Hengartner1,*
  • 1: David R. Cheriton School of Computer Science University of Waterloo Waterloo ON, N2L 3G1, Canada
*Contact email: akate@cs.uwaterloo.ca, gzaveruc@cs.uwaterloo.ca, uhengart@cs.uwaterloo.ca

Abstract

A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which provide Internet connectivity to rural areas in developing regions using conventional transportation mediums, like buses. Potential applications of these rural area DTNs are e-governance, telemedicine and citizen journalism. Therefore, security and privacy are critical for DTNs. Traditional cryptographic techniques based on PKI-certified public keys assume continuous network access, which makes these techniques inapplicable to DTNs. We present the first anonymous communication solution for DTNs and introduce a new anonymous authentication protocol as a part of it. Furthermore, we present a security infrastructure for DTNs to provide efficient secure communication based on identitybased cryptography. We show that our solutions have better performance than existing security infrastructures for DTNs.