Threat mitigation in tactical-level disruption tolerant networks

In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protoco...

Full description

Saved in:
Bibliographic Details
Main Authors: Goh, Weihan, Yeo, Chai Kiat
Other Authors: School of Computer Engineering
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/98432
http://hdl.handle.net/10220/13401
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-98432
record_format dspace
spelling sg-ntu-dr.10356-984322020-05-28T07:19:23Z Threat mitigation in tactical-level disruption tolerant networks Goh, Weihan Yeo, Chai Kiat School of Computer Engineering IEEE Global Communications Conference (2012 : Anaheim, California, US) DRNTU::Engineering::Computer science and engineering In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it. 2013-09-09T07:05:24Z 2019-12-06T19:55:12Z 2013-09-09T07:05:24Z 2019-12-06T19:55:12Z 2012 2012 Conference Paper https://hdl.handle.net/10356/98432 http://hdl.handle.net/10220/13401 10.1109/GLOCOM.2012.6503243 en
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Goh, Weihan
Yeo, Chai Kiat
Threat mitigation in tactical-level disruption tolerant networks
description In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Goh, Weihan
Yeo, Chai Kiat
format Conference or Workshop Item
author Goh, Weihan
Yeo, Chai Kiat
author_sort Goh, Weihan
title Threat mitigation in tactical-level disruption tolerant networks
title_short Threat mitigation in tactical-level disruption tolerant networks
title_full Threat mitigation in tactical-level disruption tolerant networks
title_fullStr Threat mitigation in tactical-level disruption tolerant networks
title_full_unstemmed Threat mitigation in tactical-level disruption tolerant networks
title_sort threat mitigation in tactical-level disruption tolerant networks
publishDate 2013
url https://hdl.handle.net/10356/98432
http://hdl.handle.net/10220/13401
_version_ 1681059616163627008