DocumentCode :
2335343
Title :
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs
Author :
Zhu, Haojin ; Lin, Xiaodong ; Lu, Rongxing ; Shen, Xuemin ; Xing, Dongsheng ; Cao, Zhenfu
Author_Institution :
Shanghai Jiao Tong Univ., Shanghai, China
fYear :
2010
fDate :
14-19 March 2010
Firstpage :
1
Lastpage :
9
Abstract :
Bundle Authentication is a critical security service in Delay Tolerant Networks (DTNs) that ensures authenticity and integrity of bundles during multi-hop transmissions. Public key signatures, which have been suggested in existing bundle security protocol specification, achieve bundle authentication at the cost of an increased computational, transmission overhead and a higher energy consumption, which is not desirable for energy-constrained DTNs. On the other hand, the unique ``store-carry-and-forward´´ transmission characteristic of DTNs implies that bundles from distinct/common senders can be buffered opportunistically at some common intermediate nodes. This ``buffering´´ characteristic distinguishes DTN from any other traditional wireless networks, for which an intermediate cache is not supported. To exploit such a buffering characteristic, in this paper, we propose an Opportunistic Batch Bundle Authentication Scheme (OBBA) to achieve efficient bundle authentication. The proposed scheme adopts batch verification techniques, allowing a computational overhead to be bounded by the number of opportunistic contacts instead of the number of messages. Furthermore, we introduce a novel concept of a fragment authentication tree to minimize communication cost by choosing an optimal tree height. Finally, we implement OBBA in a specific DTN scenario setting: packet-switched networks on campus. The simulation results in terms of computation time, transmission overhead and power consumption are given to demonstrate the efficiency and effectiveness of the proposed schemes.
Keywords :
digital signatures; message authentication; packet radio networks; packet switching; protocols; public key cryptography; telecommunication computing; telecommunication security; batch verification techniques; bundle security protocol specification; delay tolerant networks; energy constrained DTN; high energy consumption; multihop transmissions; opportunistic batch bundle authentication scheme; packet-switched networks; power consumption; public key signatures; store-carry-and-forward transmission characteristic; transmission overhead; wireless networks; Authentication; Buffer storage; Computational modeling; Cost function; Disruption tolerant networking; Energy consumption; Protocols; Public key; Spread spectrum communication; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2010 Proceedings IEEE
Conference_Location :
San Diego, CA
ISSN :
0743-166X
Print_ISBN :
978-1-4244-5836-3
Type :
conf
DOI :
10.1109/INFCOM.2010.5462166
Filename :
5462166
Link To Document :
بازگشت