IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151114                                                     

Authenticated Key Exchange in DTNs Using Public Key Exchange


Yamini. R, Dr. Thilagavathy. D
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Data is accessed in a network with high authentication in network security. Delay Tolerant Network (DTN) is overlaid over network to communicate in rural areas, space etc. DTNs forward data by store and forward technique. But due to dis-connectivity this transmission of data is not transmitted securely. To avoid dis-connectivity and to have secured communication Time Evolving and Two Channel cryptography are implemented with RSA based key Exchange.

Yamini. R, Dr. Thilagavathy. D

Delay Tolerant Network, Bundle Protocol, Time Evolving, Two Channel cryptography, Key Exchange.

' [1] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson “Delay-Tolerant Networking Architecture”NetworkWorkingGroup Google/Jet Propulsion Laboratory, April 2007
[2] Artemios G. Voyiatzis, Member, IEEE “A Survey of Delay- and Disruption-Tolerant NetworkingApplications” Journal of Internet Engineering, Vol. 5, No. 1, June2012
[3] Fall, K.. “Adelay-tolerant network architecture for challenged internets”, SIGCOMM’03: Proceedings of the2003 conference on Applications, technologies, architectures, and protocols for computer communications,ACM, New York, NY, USA, pp. 27–34. 2003
[4] R. Patra, S. Surana, and S. Nedevschi, “Hierarchical identity based cryptography for end-to-end security in DTNs,” in Proc. IEEE 4th Int. Conf. ICCP, Aug. 2008, pp. 223–230.
[5] W. Van Besien, “Dynamic, non-interactive key management for the bundle protocol,” in Proc. 5th ACM Workshop Challenged Netw., 2010, pp. 75–78.
[6] M. Huang, S. Chen, Y. Zhu, and Y. Wang, “Cost-efficient topology design problem in time-evolving delay-tolerant networks,” in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1–5.
[7] Z. Jia, X. Lin, S. Tan, L. Li, and Y. Yang, “Public key distribution scheme for delay tolerant networks based on two-channel cryptography,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905–913, May 2012.
[8] http://crypto.stackexchange.com/questions/14508/diffie-hellman-key-exchange-with-authentication-man-in-the-middle-query
[9] http://www.internet-computer-security.com/VPN Guide/RSA.html

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary - 2015
Date of Publication Print ISSN Online ISSN
2015-02-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
105-107 IJSRSET151114   Technoscience Academy

Cite This Article

Yamini. R, Dr. Thilagavathy. D, "Authenticated Key Exchange in DTNs Using Public Key Exchange", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.105-107, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET151114.php