skip to main content
10.1145/1247694.1247705acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Applicability of identity-based cryptography for disruption-tolerant networking

Published: 11 June 2007 Publication History

Abstract

Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We analyze the applicability of IBC in this context and conclude that for authentication and integrity, IBC has no significant advantage over traditional cryptography, but it can indeed enable better ways of providing confidentiality. Additionally, we show a way of bootstrapping the needed security associations for IBC use from an existing authentication infrastructure.

References

[1]
K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. SIGCOMM, August 2003.
[2]
A. Seth, U. Hengartner, and S. Keshav, "Practical security for disconnected nodes," in First Workshop on Secure Network Protocols (NPSec), November 2005. Revised 2006 version of the NPSec paper http://www.cs.uwaterloo.ca/~3seth/practical security v2.pdf.
[3]
S. Symington, S. Farrell, and H. Weiss, Bundle Security Protocol Specification. IRTF, DTN research group, October 2006. Draft version -02; expires in April 2007.
[4]
S. Farrell, S. Symington, and H. Weiss, Delay-Tolerant networking security overview. IRTF, DTN research group, October 2006. Draft version -02; expires in April 2007.
[5]
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO 2001, Advances in Cryptology, no. 2139 in Lecture Notes in Computer Science, pp. 213--229, Springer-Verlag, August 2001.
[6]
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in 8th Intl. Conf. on the Theory and Application of Cryptology and Information Security, December 2002.
[7]
N. Asokan and L. Tarkkala, "Issues in initializing security," in Proc. Fifth IEEE Intl. Symposium on Signal Processing and Information Technology, pp. 460 -- 465, IEEE Press, December 2005.
[8]
P. Laitinen et al., "Extending cellular authentication as a service," in Proc. First IEE Intl. Conf. on Commercialising Technology and Innovation, September 2005. http://www-admin.iee.org/OnComms/PN/communications/062%20-%20P%20Ginzboorg.pdf

Cited By

View all
  • (2025)Cryptography is Rocket ScienceIACR Communications in Cryptology10.62056/a39qudhdj1:4Online publication date: 13-Jan-2025
  • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
  • (2024)A Proposed Clock Synchronization Method for the Solar System Internet2024 IEEE Aerospace Conference10.1109/AERO58975.2024.10521325(1-17)Online publication date: 2-Mar-2024
  • Show More Cited By

Index Terms

  1. Applicability of identity-based cryptography for disruption-tolerant networking

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiOpp '07: Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
    June 2007
    108 pages
    ISBN:9781595936882
    DOI:10.1145/1247694
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. disruption- and delay-tolerant networking
    2. identity-based cryptography
    3. initializing security

    Qualifiers

    • Article

    Conference

    Mobisys07
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Cryptography is Rocket ScienceIACR Communications in Cryptology10.62056/a39qudhdj1:4Online publication date: 13-Jan-2025
    • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
    • (2024)A Proposed Clock Synchronization Method for the Solar System Internet2024 IEEE Aerospace Conference10.1109/AERO58975.2024.10521325(1-17)Online publication date: 2-Mar-2024
    • (2024)Security attacks in Opportunistic Mobile Networks: A systematic literature reviewJournal of Network and Computer Applications10.1016/j.jnca.2023.103782221(103782)Online publication date: Jan-2024
    • (2024)Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWEPost-Quantum Cryptography10.1007/978-3-031-62743-9_10(300-321)Online publication date: 11-Jun-2024
    • (2023)On the LWE Cryptosystem with More General DisturbanceProceedings of the Second International Forum on Financial Mathematics and Financial Technology10.1007/978-981-99-2366-3_8(155-168)Online publication date: 25-Jul-2023
    • (2021)A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle NetworksIEEE Internet of Things Journal10.1109/JIOT.2020.30149478:16(12481-12489)Online publication date: 15-Aug-2021
    • (2021)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityDesigns, Codes and Cryptography10.1007/s10623-021-00895-3Online publication date: 5-Jun-2021
    • (2020)A Security Trust Mechanism for Data Collection with Mobile Vehicles in Smart City2020 IEEE/CIC International Conference on Communications in China (ICCC)10.1109/ICCC49849.2020.9238834(512-517)Online publication date: 9-Aug-2020
    • (2020)Joint mobile vehicle–UAV scheme for secure data collection in a smart cityAnnals of Telecommunications10.1007/s12243-020-00798-9Online publication date: 31-Aug-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media