Authenticated Key Exchange (AKE) in Delay Tolerant Networks

Key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in space environments. In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol. In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, which heavily influences the underlying security solution.

[1]  Stephen Farrell,et al.  Delay-Tolerant Networking Security Overview , 2009 .

[2]  H. Elkamchouchi,et al.  An efficient and confirmed protocol for authenticated key agreement , 2008, 2008 National Radio Science Conference.

[3]  Dimitrios Hristu-Varsakelis,et al.  Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols , 2007, ICETE.

[4]  H.M. Elkamchouchi,et al.  A new secure and fast hashing algorithm (SFHA-256) , 2008, 2008 National Radio Science Conference.

[5]  Alfred Menezes,et al.  Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.

[6]  Xiaodong Lin,et al.  Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..

[7]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[8]  Victor Shoup Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.

[9]  Hassan M. Elkamchouchi,et al.  An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).

[10]  H. Cruickshank,et al.  Security analysis for Delay/Disruption Tolerant satellite and sensor networks , 2009, 2009 International Workshop on Satellite and Space Communications.

[11]  Kristin E. Lauter,et al.  Security Analysis of KEA Authenticated Key Exchange Protocol , 2006, IACR Cryptol. ePrint Arch..

[12]  Dimitrios Hristu-Varsakelis,et al.  A Provably Secure One-Pass Two-Party Key Establishment Protocol , 2007, Inscrypt.

[13]  Chi-Chun Lo,et al.  Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols , 2010 .

[14]  Wesley M. Eddy,et al.  A bundle of problems , 2009, 2009 IEEE Aerospace conference.

[15]  Aggelos Kiayias,et al.  Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.

[16]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[17]  Jörg Ott,et al.  NRC-TR-2007-007 Towards Securing Disruption-Tolerant Networking , 2007 .

[18]  Alireza Nemaney Pour,et al.  Number Theory and related Algorithms in Cryptography , 2002 .

[19]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[20]  Stephen Farrell,et al.  Bundle Security Protocol Specification , 2011, RFC.

[21]  Konstantinos Chalkias,et al.  Attacks on the AKACP Protocol , 2010, IACR Cryptol. ePrint Arch..

[22]  H. Elkamchouchi,et al.  A New Approach for Key Controlled Agreement , 2007, 2007 National Radio Science Conference.

[23]  William L. Van Besien Dynamic, non-interactive key management for the bundle protocol , 2010, CHANTS '10.

[24]  Hugo Krawczyk,et al.  HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.

[25]  Stephen Farrell DTN Key Management Requirements , 2007 .