• DocumentCode
    2875422
  • Title

    Authenticated resource management in delay-tolerant networks using proxy signatures

  • Author

    Schurmann, Dominik ; Ott, Johannes ; Wolf, Lars

  • Author_Institution
    Inst. of Oper. Syst. & Comput. Networks (IBR), Tech. Univ. Braunschweig, Braunschweig, Germany
  • fYear
    2013
  • fDate
    18-20 March 2013
  • Firstpage
    44
  • Lastpage
    51
  • Abstract
    In Delay-Tolerant Networks (DTN), individual nodes with much higher rates of sending new bundles than average can degrade the delivery rate of other nodes substantially. They have a much higher impact on the overall network fairness than in traditional networks because of DTN - specific properties, such as decentralized design and the store-and-forward approach. Authenticated resource management schemes were proposed to guarantee minimum delivery rates in the presence of nodes with high resource utilization as well as in the presence of malicious nodes performing Denial-of-Service (DoS) attacks. They partition the buffer adaptively based on the source node identifier of incoming bundles, which is cryptographically authenticated by the network. We extend such approaches by using a cryptographic primitive named proxy signature. Our method allows treating a bundle not only based on its source node. Instead, a combined affiliation of the source node together with the requesting node can be used which allows for better support of important communication patterns such as request-response. Our method can improve the overall fairness and is similar to a reverse charge call in telephone networks, as the requesting node “pays” for the response by allowing it to also use buffer space normally assigned to itself. We evaluate our approach using simulations in different scenarios.
  • Keywords
    computer network management; computer network security; cryptography; delay tolerant networks; DTN-specific property; DoS attack; authenticated resource management scheme; cryptographic primitive named proxy signature; cryptographically authentication; delay-tolerant network; denial-of-service attack; high resource utilization; malicious node; proxy signature; reverse charge call; source node identification; telephone network; Authentication; Buffer storage; Computer crime; Encryption; Public key; Resource management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference on
  • Conference_Location
    Banff, AB
  • Print_ISBN
    978-1-4799-0747-2
  • Type

    conf

  • DOI
    10.1109/WONS.2013.6578320
  • Filename
    6578320