Title :
Region-Based Security Architecture for DTN
Author :
Fida, Mah-Rukh ; Ali, Mohammad ; Adnan, Awais ; Arsalaan, Ameer Shakayb
Author_Institution :
Frontier Women Univ., Peshawar, Pakistan
Abstract :
Due to the disrupted nature of intermittently connected networks, traditional security infrastructure i.e., Public Key Infrastructure (PKI) suffers difficulty in security provision. Unlike PKI, Identity Based Cryptography (IBC) does not need end-to-end connectivity to trusted third party for certificate retrieval before message transmission. It enables a sender to create a valid public key of destination entity on fly and hence successfully works with the disrupted nature of delay tolerant network (DTN). An extension of IBC namely Hierarchical IBC (HIBC) efficiently provides secure communication in large sparsely populated and intermittently connected DTN regions with security servers working in hierarchy. In the paper we have proposed HIBC-based key management architecture for challenged DTN regions with Internet working as a backbone region. We have discussed mechanisms of secure communication between two end nodes that may either belong to same or different region(s) of similar or different security architectures.
Keywords :
Internet; computer network security; public key cryptography; DTN; HIBC-based key management architecture; Internet; delay tolerant network; hierarchical IBC; identity based cryptography; public key infrastructure; region-based security architecture; Cryptography; High definition video; Internet; Logic gates; Mercury (metals); Servers; Correspondent Entity (CE); Foreign Domain (FD); Foreign Gateway (FG); Home Domain (HD); Home Gateway (HG); Identifier (ID); Mobile Entity (ME);
Conference_Titel :
Information Technology: New Generations (ITNG), 2011 Eighth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-61284-427-5
Electronic_ISBN :
978-0-7695-4367-3
DOI :
10.1109/ITNG.2011.75