• DocumentCode
    1973203
  • Title

    Threat mitigation in tactical-level disruption tolerant networks

  • Author

    Weihan Goh ; Chai Kiat Yeo

  • Author_Institution
    Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore
  • fYear
    2012
  • fDate
    3-7 Dec. 2012
  • Firstpage
    997
  • Lastpage
    1003
  • Abstract
    In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.
  • Keywords
    message authentication; telecommunication network topology; telecommunication security; DTN; IBS; beacon messages; identity-based signature scheme; neighbor discovery; tactical-level disruption tolerant networks; threat mitigation; beacon message security; disruption tolerant networks; identity-based signature; plausible deniability; translucent sets;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Communications Conference (GLOBECOM), 2012 IEEE
  • Conference_Location
    Anaheim, CA
  • ISSN
    1930-529X
  • Print_ISBN
    978-1-4673-0920-2
  • Electronic_ISBN
    1930-529X
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2012.6503243
  • Filename
    6503243