ID Based Cryptography and anonymity in Delay/Disruption Tolerant Networks

7Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/ Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user. © 2010 Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

Cite

CITATION STYLE

APA

Ahmad, N., Cruickshank, H., & Sun, Z. (2010). ID Based Cryptography and anonymity in Delay/Disruption Tolerant Networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 43 LNICST, pp. 265–275). https://doi.org/10.1007/978-3-642-13618-4_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free