Proceedings of the Second International Workshop on Mobile Opportunistic Networking 2010
DOI: 10.1145/1755743.1755758
|View full text |Cite
|
Sign up to set email alerts
|

Secure descriptive message dissemination in DTNs

Abstract: Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. A key feature of DTN technology is the late-binding capability that allows messages destined to a descriptive name to be resolved progressively until the messages are delivered to one or several recipients. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 18 publications
(37 reference statements)
0
12
0
Order By: Relevance
“…In the similar way to the previous works [19], [20], the exchanged content data are encrypted using the CP-ABE, and the ciphertext is sent from the source node to the destination node in the storeand-forward way of the DTN. Due to the hybrid approach, the temporal key is encrypted by CP-ABE, and the content data is encrypted by AES on the key.…”
Section: Overview Of System Constructionmentioning
confidence: 99%
See 3 more Smart Citations
“…In the similar way to the previous works [19], [20], the exchanged content data are encrypted using the CP-ABE, and the ciphertext is sent from the source node to the destination node in the storeand-forward way of the DTN. Due to the hybrid approach, the temporal key is encrypted by CP-ABE, and the content data is encrypted by AES on the key.…”
Section: Overview Of System Constructionmentioning
confidence: 99%
“…The networks include Wireless Sensor Networks (WSNs) [7], Mobile Ad-hoc NETworks (MANETs) [20], Vehicle Ad-hoc NETworks (VANETs) [9], etc. In such networks, mobile devices construct their own autonomous network topology to communicate with each other, by exchanging routing messages to update their routing tables.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…lawn mower belongs to both "lawn care" and "appliances" categories, will be encrypted such that any user who is interested in either "appliances" or "lawn care" will be able to retrieve such data items from the storage nodes. Details of our enhanced CP-ABE design which includes new features such as supporting dynamic attributes, negative attributes and user revocation can be found in [26]. The dynamic attributes will be useful for region-based content distribution e.g.…”
Section: E Publishing Secured Data Itemsmentioning
confidence: 99%