首页 | 本学科首页   官方微博 | 高级检索  
     


Public key distribution scheme for delay tolerant networks based on two-channel cryptography
Affiliation:1. Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China;2. Faculty of Business and Information Technology, University of Ontario Institute of Technology, 2000 Simcoe Street North, Oshawa, Ontario, Canada L1H 7K4;3. School of Information Science and Engineering, University of Jinan, China;1. AECOM, 3101 Wilson Blvd., Arlington, VA 22201, United States;2. Booz Allen Hamilton, McLean, VA 22102, United States;3. Gulf Coast Center for Evacuation and Transportation Resiliency, Department of Civil and Environmental Engineering, Louisiana State University, Baton Rouge, LA 70803, United States;1. University of Canterbury, Private Bag 4800, Christchurch 8140, New Zealand;2. University of South Australia, GPO Box 2471, Adelaide, South Australia, Australia;3. INTERPOL Global Complex for Innovation, Singapore;4. University of Electronic Science and Technology of China, Chengdu 611731, China
Abstract:A delay tolerant network (DTN) is a store carry and forward network characterized by highly mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and physical obstructions. Emerging applications of DTN include rural DTN, vehicular DTN and pocket DTN. The development of DTN raises a number of security-related challenges due to inconsistent network access and unreliable end-to-end network path. One of the challenges is initial secure context establishment as it is unrealistic to assume that public key infrastructure (PKI) is always globally present and available, hence, the public key management becomes an open problem for DTN. In this paper, for the first time, we propose a dynamic virtual digraph (DVD) model for public key distribution study by extending graph theory and then present a public key distribution scheme for pocket DTN based on two-channel cryptography. By distinguishing between owners and carriers, public key exchange and authentication issues in the decentralized pocket DTN environment can be solved by a two-channel cryptography process and our simulation results have proven it.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号