{"title":"Threat mitigation in tactical-level disruption tolerant networks","authors":"Weihan Goh, C. Yeo","doi":"10.1109/GLOCOM.2012.6503243","DOIUrl":null,"url":null,"abstract":"In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"1 1","pages":"997-1003"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... IEEE Global Communications Conference. IEEE Global Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2012.6503243","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it.