Logo Goletty

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
Journal Title Journal of Communications
Journal Abbreviation jcm
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (1,003 kb)
   
Title Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
Authors Zhuang, Weihua; Samuel, Hany
Abstract Maintaining user connectivity over heterogeneous wireless networks will be a necessity with the wide spread of wireless networks and limited geographic coverage and capacity of each network. In [1], we propose a super node system architecture based on the concept of delay tolerant network (DTN) to overcome roaming user intermittent connections over interconnected heterogeneous wireless networks. Mobile ad hoc networks play a key role in the super node system as it can provide a coverage for areas that lack a network infrastructure to bridge gaps between wireless networks within the system. Long delays combined with the lack of continuous communications with a network server introduces new challenges in information security for mobile nodes in a DTN environment. One of the major open challenges is to prevent unauthorized traf_c from entering the network. This paper addresses this problem within the super node system. Two schemes are proposed: one is based on asymmetric key cryptography by authenticating the message sender, and the other is based on the idea of separating message authorization checking at intermediate nodes from message sender authentication. Consequently, the second scheme uses symmetric key cryptography in order to reduce the computation overhead imposed on intermediate mobile nodes, where one-way key chains are used. A simulation study is conducted to demonstrate the effectiveness of each scheme and compare the performance with and without using an authorization scheme. Moreover, the problem of secure end-to-end message exchanges is introduced by mapping the problem from a challenged network domain (i.e., among roaming nodes) to a reliable network domain (i.e., among super nodes over the Internet backbone). The proposed symmetric key based scheme is extended to achieve end-to-end security.
Publisher ACADEMY PUBLISHER
Date 2010-02-01
Source Journal of Communications Vol 5, No 2 (2010): Special Issue: Delay Tolerant Networks, Architecture, and Applications
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024