• DocumentCode
    2273241
  • Title

    A secure message delivery scheme with path tracking for delay tolerant networks

  • Author

    Jia, Zhongtian ; Raffay, Muhammad Ali ; Li, Lixiang ; Lin, Xiaodong ; Yang, Yixian

  • Author_Institution
    Shandong Provincial Key Lab. of Network based Intell. Comput., Univ. of Jinan, Jinan, China
  • fYear
    2012
  • fDate
    15-17 Aug. 2012
  • Firstpage
    161
  • Lastpage
    166
  • Abstract
    In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. Unfortunately, there always exist some selfish nodes that are reluctant to contribute to this cooperative data forwarding procedure so as to save their valuable storage buffer, limited computation power and precious energy. In order to stimulate nodes´ willingness to participate in data forwarding, a number of incentive schemes have been proposed recently. However, most existing incentive schemes simply ignore efforts of nodes involved in message delivery if messages delivered fail to reach their destinations. Due to the nature of DTN, such as intermittent connectivity, it is not unusual to have unreliable message delivery, which results in unrewarded or wasted efforts for participating nodes and may discourage them from participating in future data forwarding. Therefore, it is crucial to recognize contribution of every node involved in a data forwarding procedure even the message it helps to forward doesn´t successfully reach its destination. However, how to track all delivery paths so as to give every intermediate node some incentive for their cooperative efforts of data forwarding is still an open research problem. To address this problem, we propose a secure message forwarding scheme with path tracking. The proposed method is end-to-end secure with data source and identity authentication. In addition, it can thwart some well known attacks including edge inserting attack, sibling inserting attack and free riding attack.
  • Keywords
    buffer storage; delay tolerant networks; message authentication; protocols; telecommunication security; DTN; data forwarding procedure; data identity authentication; data source authentication; delay tolerant networks; edge inserting attack; free riding attack; incentive schemes; path tracking; secure message delivery scheme; sibling inserting attack; store-carry-forward relaying; time linking protocol; valuable storage buffer; Joining processes; Nickel; Protocols; Public key; Relays;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications in China (ICCC), 2012 1st IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4673-2814-2
  • Electronic_ISBN
    978-1-4673-2813-5
  • Type

    conf

  • DOI
    10.1109/ICCChina.2012.6356871
  • Filename
    6356871