Threat mitigation in tactical-level disruption tolerant networks
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protoco...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/98432 http://hdl.handle.net/10220/13401 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-98432 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-984322020-05-28T07:19:23Z Threat mitigation in tactical-level disruption tolerant networks Goh, Weihan Yeo, Chai Kiat School of Computer Engineering IEEE Global Communications Conference (2012 : Anaheim, California, US) DRNTU::Engineering::Computer science and engineering In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it. 2013-09-09T07:05:24Z 2019-12-06T19:55:12Z 2013-09-09T07:05:24Z 2019-12-06T19:55:12Z 2012 2012 Conference Paper https://hdl.handle.net/10356/98432 http://hdl.handle.net/10220/13401 10.1109/GLOCOM.2012.6503243 en |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Goh, Weihan Yeo, Chai Kiat Threat mitigation in tactical-level disruption tolerant networks |
description |
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Goh, Weihan Yeo, Chai Kiat |
format |
Conference or Workshop Item |
author |
Goh, Weihan Yeo, Chai Kiat |
author_sort |
Goh, Weihan |
title |
Threat mitigation in tactical-level disruption tolerant networks |
title_short |
Threat mitigation in tactical-level disruption tolerant networks |
title_full |
Threat mitigation in tactical-level disruption tolerant networks |
title_fullStr |
Threat mitigation in tactical-level disruption tolerant networks |
title_full_unstemmed |
Threat mitigation in tactical-level disruption tolerant networks |
title_sort |
threat mitigation in tactical-level disruption tolerant networks |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/98432 http://hdl.handle.net/10220/13401 |
_version_ |
1681059616163627008 |