Security in Delay Tolerant Networks for the Android Platform

نویسندگان

  • Sebastian Domancich
  • Antti Ylä-Jääski
  • Marco Zennaro
  • Hervé Ntareme
  • Rerngvit Yanggratoke
چکیده

Security Block (ASB) The structure of an ASB is presented in g. 3.2, and contains the following elds. • Block type code: Speci es the type of the block and is included in all DTN blocks. As of security, it speci es whether the block is BAB (0x02), PIB (0x03), PCB (0x04) or ESB (0x09). • Block processing control ags: It is de ned in the Bundle Protocol and is common to all DTN blocks. • EID references: Is an optional eld that contains the security-source and security-destination of the present bundle. • Block data length: Contains the length (bytes) of the remainder of the block. • Ciphersuite ID: Speci es the ciphersuite that is being used among the registered ones. • Ciphersuite ags: Control ags that mandate the security functionality. • Correlator: This optional eld is used to associate several related instances of a security block when this functionality is needed • Ciphersuite parameters and Security result: These two elds are composed of tuples represented as type-length-value, and are used by the CHAPTER 3. DTNRG PROTOCOLS 22 di erent ciphersuites to store security results. Some of the types that can be included are: Initialization Vector, encoded key information, salt, PCB Integrity Check value (ICV). Figure 3.2: Abstract Security Block (ASB) Payload Con dentiality Block (PCB) PCB is used to indicate that the bundle payload has been encrypted at the PCB security-source, and it will be decrypted at the security-destination. A ciphersuite that operates with a PCB should rstly generate a secure random key, called bundle encryption key (BEK) and use this key to encrypt the payload of the bundle. After that, it should encrypt the BEK with a long term encryption key (e.g., a public key) and send this encrypted key inside the PCB. In addition, a data integrity mechanism should be implemented to detect tampering into the bundle payload content. Bundle Authentication Block (BAB) BAB provides integrity and authenticity of the whole bundle on a hop-byhop basis, i.e., from a security-capable node to the next security-capable node (which might be actually more than one node distance). Payload Integrity Block (PIB) The PIB provides integrity and authenticity for the payload in an end-toend basis, starting from a security-source, which generates a signature of the block, and ending in the security-destination, which veri es the integrity of the received payload. Intermediate nodes could eventually check the integrity in case that they are in possession of the needed credentials. CHAPTER 3. DTNRG PROTOCOLS 23 Extension Security Block (ESB) The ESB is a later addition to the Bundle Security Protocol, which allows the protection of blocks not considered by the previous services. The Bundle Protocol allow the creation of speci c-purpose blocks to provide a particular functionality. The previously de ned security blocks aim only at encrypting the bundle payload and integrity protecting the whole bundle. In case that a speci c-purpose extension block needs security, the ESB is the right security block to provide it.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks

Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...

متن کامل

پروتکل مسیریابی خودتطبیقی با محدوده تأخیر برای شبکه های موردی بین خودرویی

Abstract Vehicular Ad Hoc Network (VANET) is a particular type of mobile ad hoc network in which vehicles communicate between themselves using wireless antenna.  Due to unique characteristics of VANETs (e.g. high mobility of nodes and dynamic topology), routing is one of the challenging tasks in such networks. Consequently, delay tolerant networks which consider the disconnect nature of...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

Improving Smartphone Security and Reliability

Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android s...

متن کامل

Authenticated Key Exchange (AKE) in Delay Tolerant Networks

Key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in space environments. In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol. In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010