Applicability of identity-based cryptography for disruption-tolerant networking

N. Asokan*, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

68 Citations (Scopus)

Abstract

Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We analyze the applicability of IBC in this context and conclude that for authentication and integrity, IBC has no significant advantage over traditional cryptography, but it can indeed enable better ways of providing confidentiality. Additionally, we show a way of bootstrapping the needed security associations for IBC use from an existing authentication infrastructure.

Original languageEnglish
Title of host publicationMobiOpp'07
Subtitle of host publicationProceedings of the First International MobiSys Workshop on Mobile Opportunistic Networking
PublisherACM
Pages52-56
Number of pages5
ISBN (Print)1595936882, 9781595936882
DOIs
Publication statusPublished - 2007
MoE publication typeA4 Conference publication
EventInternational MobiSys Workshop on Mobile Opportunistic Networking - San Juan, Puerto Rico
Duration: 11 Jun 200711 Jun 2007
Conference number: 1

Workshop

WorkshopInternational MobiSys Workshop on Mobile Opportunistic Networking
Abbreviated titleMobiOpp
Country/TerritoryPuerto Rico
CitySan Juan
Period11/06/200711/06/2007

Keywords

  • Disruption- and delay-tolerant networking
  • Identity-based cryptography
  • Initializing security

Fingerprint

Dive into the research topics of 'Applicability of identity-based cryptography for disruption-tolerant networking'. Together they form a unique fingerprint.

Cite this