Secure Information Forwarding through Fragmentation in Delay-tolerant Networks

被引:3
|
作者
Datta, Shudip [1 ]
Madria, Sanjay [1 ]
Milligan, James [2 ]
Linderman, Mark [2 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
[2] Air Force Res Lab, Informat Management Directorate, Rome, NY USA
关键词
ELLIPTIC CURVE CRYPTOGRAPHY; KEY MANAGEMENT;
D O I
10.1109/SRDS.2018.00020
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In application environments like international military coalitions or multi-party relief work in a disaster zone, passing secure messages using Delay Tolerant Networks (DTNs) is challenging because existing public-private key cryptographic approaches may not be always accessible across different groups due to the unavailability of Public Key Infrastructure (PKI). In addition, connectivity may be intermittent so finding the reliable route is also difficult. Thus, instead of sending the complete message in a single packet, fragmenting the messages and sending them via multiple nodes can help achieve better security and reliability when multiple groups are involved. Therefore, encrypting messages before fragmentation and then sending both the data fragments and the key fragments (needed for decryption) provide much higher security. Keys are also fragmented as sending the key in a single packet can hamper security if it is forwarded to some corrupted nodes who may try to tamper or drop it. Hence, in this paper, we develop a scheme to provide improved security by generating multiple key-shares and data fragments and disseminating them via some intermediate nodes. In this fragmentation process, we also create a few redundant blocks to guarantee higher data arrival rate at the destination when message drop rate is higher like in the DTN environment. Our performance evaluation when compared to the most closely related scheme like Multiparty Encryption shows the improvement on minimizing the number of compromised messages as well as reduced bandwidth consumption in the network.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [31] Exploiting Time-varying Graphs for Data Forwarding in Mobile Social Delay-Tolerant Networks
    Xie, Dongliang
    Wang, Xin
    Liu, Lanchao
    Mae, Linhui
    2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [32] SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
    Zhu, Haojin
    Lin, Xiaodong
    Lu, Rongxing
    Fan, Yanfei
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (08) : 4628 - 4639
  • [33] A data forwarding algorithm for periodical links in space delay-tolerant network
    Du, X. (dxh37139@sina.com), 1600, Science Press (50):
  • [34] Delay-tolerant forwarding strategy for named data networking in vehicular environment
    Kuai, Meng
    Hong, Xiaoyan
    Yu, Qiangyuan
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (01) : 1 - 12
  • [35] Distance-Based Energy-Efficient Opportunistic Broadcast Forwarding in Mobile Delay-Tolerant Networks
    Lu, Yue
    Wang, Wei
    Chen, Lin
    Zhang, Zhaoyang
    Huang, Aiping
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (07) : 5512 - 5524
  • [36] DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS
    Ren, Yanzhi
    Chuah, Mooi Choo
    Yang, Jie
    Chen, Yingying
    IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) : 36 - 42
  • [37] Asynchronous Opportunity Routing for Delay-tolerant Networks
    Fan Xiumei
    Chen Hui
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 698 - 702
  • [38] A Relative Time Implementation for Delay-Tolerant Networks
    Van Bruggen, Dirk
    Ardi, Calvin
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 87 - 88
  • [39] Robust routing in deterministic delay-tolerant networks
    Bocquillon, Ronan
    Jouglet, Antoine
    COMPUTERS & OPERATIONS RESEARCH, 2018, 92 : 77 - 86
  • [40] Orion Routing Protocol for Delay-Tolerant Networks
    Medjiah, Samir
    Ahmed, Toufik
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,