Authenticated Key Exchange in DTNs Using Public Key Exchange

Authors(2) :-Yamini. R, Dr. Thilagavathy. D

Data is accessed in a network with high authentication in network security. Delay Tolerant Network (DTN) is overlaid over network to communicate in rural areas, space etc. DTNs forward data by store and forward technique. But due to dis-connectivity this transmission of data is not transmitted securely. To avoid dis-connectivity and to have secured communication Time Evolving and Two Channel cryptography are implemented with RSA based key Exchange.

Authors and Affiliations

Yamini. R
Department of Computer Science and Engineering, Adhiyamaan college of engineering Hosur, Tamiladu, India.
Dr. Thilagavathy. D
Department of Computer Science and Engineering, Adhiyamaan college of engineering Hosur, Tamiladu, India.

Delay Tolerant Network, Bundle Protocol, Time Evolving, Two Channel cryptography, Key Exchange.

[1] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson “Delay-Tolerant Networking Architecture”NetworkWorkingGroup Google/Jet Propulsion Laboratory, April 2007
[2] Artemios G. Voyiatzis, Member, IEEE “A Survey of Delay- and Disruption-Tolerant NetworkingApplications” Journal of Internet Engineering, Vol. 5, No. 1, June2012
[3] Fall, K.. “Adelay-tolerant network architecture for challenged internets”, SIGCOMM’03: Proceedings of the2003 conference on Applications, technologies, architectures, and protocols for computer communications,ACM, New York, NY, USA, pp. 27–34. 2003
[4] R. Patra, S. Surana, and S. Nedevschi, “Hierarchical identity based cryptography for end-to-end security in DTNs,” in Proc. IEEE 4th Int. Conf. ICCP, Aug. 2008, pp. 223–230.
[5] W. Van Besien, “Dynamic, non-interactive key management for the bundle protocol,” in Proc. 5th ACM Workshop Challenged Netw., 2010, pp. 75–78.
[6] M. Huang, S. Chen, Y. Zhu, and Y. Wang, “Cost-efficient topology design problem in time-evolving delay-tolerant networks,” in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1–5.
[7] Z. Jia, X. Lin, S. Tan, L. Li, and Y. Yang, “Public key distribution scheme for delay tolerant networks based on two-channel cryptography,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905–913, May 2012.
[8] http://crypto.stackexchange.com/questions/14508/diffie-hellman-key-exchange-with-authentication-man-in-the-middle-query
[9] http://www.internet-computer-security.com/VPN Guide/RSA.html

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary 2015
Date of Publication : 2015-02-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 105-107
Manuscript Number : IJSRSET151114
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Yamini. R, Dr. Thilagavathy. D, " Authenticated Key Exchange in DTNs Using Public Key Exchange, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.105-107, January-Febuary-2015.
Journal URL : http://ijsrset.com/IJSRSET151114

Article Preview

Follow Us

Contact Us