Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/98432
Title: Threat mitigation in tactical-level disruption tolerant networks
Authors: Goh, Weihan
Yeo, Chai Kiat
Keywords: DRNTU::Engineering::Computer science and engineering
Issue Date: 2012
Abstract: In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.
URI: https://hdl.handle.net/10356/98432
http://hdl.handle.net/10220/13401
DOI: 10.1109/GLOCOM.2012.6503243
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:SCSE Conference Papers

Page view(s) 50

515
Updated on Jan 29, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.