Authenticated Key Exchange in DTNs Using Public Key Exchange
Keywords:
Delay Tolerant Network, Bundle Protocol, Time Evolving, Two Channel cryptography, Key Exchange.Abstract
Data is accessed in a network with high authentication in network security. Delay Tolerant Network (DTN) is overlaid over network to communicate in rural areas, space etc. DTNs forward data by store and forward technique. But due to dis-connectivity this transmission of data is not transmitted securely. To avoid dis-connectivity and to have secured communication Time Evolving and Two Channel cryptography are implemented with RSA based key Exchange.
References
[1] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson “Delay-Tolerant Networking Architectureâ€NetworkWorkingGroup Google/Jet Propulsion Laboratory, April 2007
[2] Artemios G. Voyiatzis, Member, IEEE “A Survey of Delay- and Disruption-Tolerant NetworkingApplications†Journal of Internet Engineering, Vol. 5, No. 1, June2012
[3] Fall, K.. “Adelay-tolerant network architecture for challenged internetsâ€, SIGCOMM’03: Proceedings of the2003 conference on Applications, technologies, architectures, and protocols for computer communications,ACM, New York, NY, USA, pp. 27–34. 2003
[4] R. Patra, S. Surana, and S. Nedevschi, “Hierarchical identity based cryptography for end-to-end security in DTNs,†in Proc. IEEE 4th Int. Conf. ICCP, Aug. 2008, pp. 223–230.
[5] W. Van Besien, “Dynamic, non-interactive key management for the bundle protocol,†in Proc. 5th ACM Workshop Challenged Netw., 2010, pp. 75–78.
[6] M. Huang, S. Chen, Y. Zhu, and Y. Wang, “Cost-efficient topology design problem in time-evolving delay-tolerant networks,†in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1–5.
[7] Z. Jia, X. Lin, S. Tan, L. Li, and Y. Yang, “Public key distribution scheme for delay tolerant networks based on two-channel cryptography,†J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905–913, May 2012.
[8] http://crypto.stackexchange.com/questions/14508/diffie-hellman-key-exchange-with-authentication-man-in-the-middle-query
[9] http://www.internet-computer-security.com/VPN Guide/RSA.html
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.