DocumentCode
1973203
Title
Threat mitigation in tactical-level disruption tolerant networks
Author
Weihan Goh ; Chai Kiat Yeo
Author_Institution
Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore
fYear
2012
fDate
3-7 Dec. 2012
Firstpage
997
Lastpage
1003
Abstract
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.
Keywords
message authentication; telecommunication network topology; telecommunication security; DTN; IBS; beacon messages; identity-based signature scheme; neighbor discovery; tactical-level disruption tolerant networks; threat mitigation; beacon message security; disruption tolerant networks; identity-based signature; plausible deniability; translucent sets;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Communications Conference (GLOBECOM), 2012 IEEE
Conference_Location
Anaheim, CA
ISSN
1930-529X
Print_ISBN
978-1-4673-0920-2
Electronic_ISBN
1930-529X
Type
conf
DOI
10.1109/GLOCOM.2012.6503243
Filename
6503243
Link To Document