Practical distributed secret key generation for delay tolerant networks

Delay tolerant networks (DTNs) are resource‐constrained dynamic networks where a continuous end‐to‐end connectivity is not always available. In such a challenging network, a fixed infrastructure may not be connected when a DTN is partitioned or the message delay in the network is large. Thus, the traditional public key infrastructure system and identity‐based encryption (IBE) system are not suitable for DTNs because they rely on centralized infrastructures and require multiple round‐trip interactions. To address this issue, we propose a distributed secret key generation system with self‐certified identity (SCI‐DKG) that does not require any private key generator and threshold cryptosystem. Initially, each node generates a private key and distributes an initial message including a self‐certified identity and secret sharings to members in a DTN. Receivers independently authenticate the identity and extracts some encryption parameters corresponding to the identity from this initial message. We prove that SCI‐DKG is chosen ciphertext secure in the standard model, and it can resist potential network attacks. Simulation results show that SCI‐DKG has smaller delay and higher successful ratio of secret key generation compared with IBE and hierarchical IBE systems implemented in a DTN. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Jie Wu,et al.  Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..

[2]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[3]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[4]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[5]  Stephen Farrell,et al.  Delay-Tolerant Networking Security Overview , 2009 .

[6]  S. Keshav,et al.  Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[7]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[8]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[9]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[10]  John Burgess,et al.  Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.

[11]  Jie Yang,et al.  Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[12]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[13]  Godwin Ansa,et al.  Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks , 2010, PSATS.

[14]  John G. Proakis,et al.  Evolution of Seaweb underwater acoustic networking , 2000, OCEANS 2000 MTS/IEEE Conference and Exhibition. Conference Proceedings (Cat. No.00CH37158).

[15]  Ian Goldberg,et al.  Distributed Private-Key Generators for Identity-Based Cryptography , 2010, SCN.

[16]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[17]  Pan Hui,et al.  Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding , 2005 .

[18]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[19]  Gene Tsudik,et al.  Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[20]  V. Cahill,et al.  Security considerations in space and delay tolerant networks , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).

[21]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[22]  S. Nedevschi,et al.  Hierarchical identity based cryptography for end-to-end security in DTNs , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.

[23]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[24]  Xiaodong Lin,et al.  An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs , 2010, 2010 Proceedings IEEE INFOCOM.

[25]  R. Durst,et al.  Interplanetary internet (ipn): architectural definition , 2001 .

[26]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[27]  Xiaodong Lin,et al.  Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..

[28]  Jörg Ott,et al.  Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.