ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
نویسندگان
چکیده
Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.
منابع مشابه
Towards Securing Disruption-Tolerant Networking
Most of the existing Internet applications are built on the assumption of immediate end-to-end connectivity. However, there are many scenarios, like messaging in sparsely populated areas, in which immediate connectivity is not available. Traditional approaches for communication security may not apply in such disruption-prone environments. Recently, the use of identity-based cryptography has bee...
متن کاملAnti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to achieve anonymous delivery in Delay/Disruption Tolerant Networks. The objectives of ALAR are to minimize the probability of a data source being localized and to maximize the destination’s probability of receiving the me...
متن کاملToward Delay Tolerant Network Anonymity: Threshold Pivot Scheme
Research on Delay and Disruption Tolerant Networks (DTNs) challenges the traditional assumption of end-toend connectivity, extending networked communication to e.g. intermittently connected devices, ad-hoc mobile environments, first-responder disaster scenarios, etc. In such environments, ensuring the security and privacy of both content, networks, and participants is often vital. In this work,...
متن کاملID-Based Key Agreement with Anonymity for Ad Hoc Networks
Security support is a must for ad hoc networks. However, existing key agreement schemes for ad hoc networks ignore the issue of entity anonymity. Without anonymity, the adversary can easily identify and track specific entities in the communications. Not only entities’ movement information is valuable to the adversary but also the adversary can launch heavy attacks on those important nodes, base...
متن کاملA Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and all of them are based on bilinear pairings. In this paper, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010