Applicability of identity-based cryptography for disruption-tolerant networking

N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

66 Scopus citations

Abstract

Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We analyze the applicability of IBC in this context and conclude that for authentication and integrity, IBC has no significant advantage over traditional cryptography, but it can indeed enable better ways of providing confidentiality. Additionally, we show a way of bootstrapping the needed security associations for IBC use from an existing authentication infrastructure.

Original languageEnglish
Title of host publicationMobiOpp'07
Subtitle of host publicationProceedings of the First International MobiSys Workshop on Mobile Opportunistic Networking
Pages52-56
Number of pages5
DOIs
StatePublished - 2007
Externally publishedYes
Event5th International Conference on Mobile Systems, Applications and Services - San Juan, Puerto Rico
Duration: 11 Jun 200711 Jun 2007

Publication series

NameMobiOpp'07: Proceedings of the First International MobiSys Workshop on Mobile Opportunistic Networking

Conference

Conference5th International Conference on Mobile Systems, Applications and Services
Country/TerritoryPuerto Rico
CitySan Juan
Period11/06/0711/06/07

Keywords

  • Disruption- and delay-tolerant networking
  • Identity-based cryptography
  • Initializing security

Fingerprint

Dive into the research topics of 'Applicability of identity-based cryptography for disruption-tolerant networking'. Together they form a unique fingerprint.

Cite this