2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 2007
DOI: 10.1109/seccom.2007.4550373
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity and security in delay tolerant networks

Abstract: A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which provide Internet connectivity to rural areas in developing regions using conventional transportation mediums, like buses. Potential applications of these rural area DTNs are e-governance, telemedicine and citizen journalism. Therefore, security and privacy are critical for DTNs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 124 publications
(84 citation statements)
references
References 24 publications
(36 reference statements)
0
82
0
Order By: Relevance
“…They would not forge information to other nodes, or hide the messages that they carried. The security-related problems are out of the scope of this paper, and there exist some strong authentication schemes [26,27] that provide the verification of information.…”
Section: System Modelmentioning
confidence: 99%
“…They would not forge information to other nodes, or hide the messages that they carried. The security-related problems are out of the scope of this paper, and there exist some strong authentication schemes [26,27] that provide the verification of information.…”
Section: System Modelmentioning
confidence: 99%
“…Kate et al [22] presented an anonymous communication architecture for DTNs using Identity-Based Cryptography (IBC) [49]. This is one of the first anonymous communication solutions specifically for DTNs.…”
Section: Identity Privacymentioning
confidence: 99%
“…However, node groups are randomly clustered, which may result in the inefficient dissemination of messages inside a group. In addition, the assumption of a Public Key Infrastructure (PKI) rarely holds in MDTNs [22].…”
Section: Identity Privacymentioning
confidence: 99%
“…However, the above traditional solution for anonymity does not work in DTN because of the disconnected nature and routing strategy of DTN. With opportunistic and variable delays source routing is not always possible [22]. In DTN, there is no complete routing topology so Onion Routing (OR) does not work because OR needs to know the route in advance and encrypt the message accordingly for each router on the path.…”
Section: • Pseudonyms As Public Keymentioning
confidence: 99%