Toward Delay Tolerant Network Anonymity: Threshold Pivot Scheme
نویسندگان
چکیده
Research on Delay and Disruption Tolerant Networks (DTNs) challenges the traditional assumption of end-toend connectivity, extending networked communication to e.g. intermittently connected devices, ad-hoc mobile environments, first-responder disaster scenarios, etc. In such environments, ensuring the security and privacy of both content, networks, and participants is often vital. In this work, we consider DTN anonymity and privacy. The disconnected nature of DTNs presents a unique difficulty for traditional anonymity approaches, namely limited knowledge of other nodes and paths in the dynamic, mobile network. We develop a particular solution, the Threshold Pivot Scheme (TPS), to provide source anonymity and sender-receiver unlinkability in DTNs. Our scheme, based on secret sharing primitives, permits a user-selectable level of anonymity, an important feature for DTN environments that must balance security and usability. Through simulation and analytical analysis, we evaluate the performance and overhead of TPS and find that it addresses the constraints of DTNs while providing a suitably high-level of anonymity.
منابع مشابه
Threshold-based Message Copies Control in Delay Tolerant Networks
Delay Tolerant Networks (DTN) generally lack end-to-end connectivity and multiple message copies routing protocols are often used to improve the efficiency that messages are delivered successfully, but network load is increased due to a large number of message copies. A new scheme based on threshold is presented to control message copies efficiently in the networks. A contact counter is added i...
متن کاملIntroduction of the Parameter "Approach Ratio" for the Improvement of Higher Delivery Rate with Suppressing Network Resource Consumption in Delay Tolerant Network
The delay/disruption tolerant network (DTN) has been researched actively in the last years because of its high applicability to ubiquitous network services such as sensor networks and intelligent transport system (ITS) networks. An efficient data forwarding method for those network services is one of the key components in DTN due to the limitation of wireless network resources. This paper propo...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملRangzen: Circumventing Government-Imposed Communication Blackouts
A challenging problem in dissent networking is that of circumventing large-scale communication blackouts imposed by oppressive governments. Although prior work has not focused on the need for user anonymity, we contend that it is essential. Without anonymity, governments can use communication networks to track and persecute users. A key challenge for decentralized networks is that of resource a...
متن کاملID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks
Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptog...
متن کامل