Data is accessed in a network with high authentication in network security. Delay Tolerant Network (DTN) is overlaid over network to communicate in rural areas, space etc. DTNs forward data by store and forward technique. But due to dis-connectivity this transmission of data is not transmitted securely. To avoid dis-connectivity and to have secured communication Time Evolving and Two Channel cryptography are implemented with RSA based key Exchange.
Yamini. R, Dr. Thilagavathy. D
Delay Tolerant Network, Bundle Protocol, Time Evolving, Two Channel cryptography, Key Exchange.
 V. Cerf, S. Burleigh, A. Hooke, L. Torgerson “Delay-Tolerant Networking Architecture”NetworkWorkingGroup Google/Jet Propulsion Laboratory, April 2007
 Artemios G. Voyiatzis, Member, IEEE “A Survey of Delay- and Disruption-Tolerant NetworkingApplications” Journal of Internet Engineering, Vol. 5, No. 1, June2012
 Fall, K.. “Adelay-tolerant network architecture for challenged internets”, SIGCOMM’03: Proceedings of the2003 conference on Applications, technologies, architectures, and protocols for computer communications,ACM, New York, NY, USA, pp. 27–34. 2003
 R. Patra, S. Surana, and S. Nedevschi, “Hierarchical identity based cryptography for end-to-end security in DTNs,” in Proc. IEEE 4th Int. Conf. ICCP, Aug. 2008, pp. 223–230.
 W. Van Besien, “Dynamic, non-interactive key management for the bundle protocol,” in Proc. 5th ACM Workshop Challenged Netw., 2010, pp. 75–78.
 M. Huang, S. Chen, Y. Zhu, and Y. Wang, “Cost-efficient topology design problem in time-evolving delay-tolerant networks,” in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1–5.
 Z. Jia, X. Lin, S. Tan, L. Li, and Y. Yang, “Public key distribution scheme for delay tolerant networks based on two-channel cryptography,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905–913, May 2012.
 http://www.internet-computer-security.com/VPN Guide/RSA.html
|Published in :
||Volume 1 | Issue 1 | January-Febuary - 2015
|Date of Publication
Cite This Article
Yamini. R, Dr. Thilagavathy. D, "Authenticated Key Exchange in DTNs Using Public Key Exchange", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.105-107, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET151114.php