Abstract
Key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in space environments. In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol. In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, which heavily influences the underlying security solution.
Chapter PDF
Similar content being viewed by others
Keywords
References
Ankney, R., Johnson, D., Matyas, M.: The Unified Model, contribution to X9F1 2. ANSI X9.42, Agreement (1995)
Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Towards securing disruption-tolerant networking, Technical Report NRC-TR-2007-007 (2007)
Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for Delay/Disruption Tolerant satellite and sensor networks. In: International Workshop on Satellite and Space Communications (IWSSC), pp. 358–359 (2009)
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Chalkias, K., Halkidis, S.T., Hristu-Varsakelis, D., Stephanides, G., Alexiadis, A.: A Provably Secure One-Pass Two-Party Key Establishment Protocol. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 108–122. Springer, Heidelberg (2008)
Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Stephanides, G.: Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. In: E-Business and Telecommunication Networks (book chapter). Springer (2008)
Chalkias, K., Baldimtsi, F., Hristu-Barsakelis, D., Halkidis, S.T., Stephanides, G.: Attacks on the AKACP Protocol. IACR Cryptology Eprint Archive (2010)
Elkamchouchi, H., Eldefrawy, M.: A New Approach for Key Controlled Agreement. In: 24th National Radio Science Conference, NRSC 2007, pp. 1–7. Ain Shams University, Egypt (2007)
Elkamchouchi, H., Eldefrawy, M.: An Efficient and Confirmed Protocol for Authentication Key Agreement. In: 25th National Radio Science Conference, NRSC 2008, pp. 1–8. Tanta University, Egypt (2008)
Farrell, S.: DTN Key Management Requirements, work in progress as an internet-draft (2007), http://tools.ietf.org/html/draft-farrell-dtnrg-km-00
Farrell, A., Symington, S.F., Weiss, H., Lovell, P.: Delay-Tolerant Networking Security Overview, internet-draft (2009), http://tools.ietf.org/html/draft-irtf-dtnrg-sec-overview-06
Horster, P., Michels, M., Petersen, H.: Authenticated encryption schemes with low communication costs. IEEE Electronics Letters 30(15), 1212–1213 (1994)
Internationl standard: Information technology - Security techniques - Key management - Part3: Mechanisms using asymmetric techniques. 2 edn. (2008)
Jia, Z., Lin, X., Tan, S.-H., Li, L., Yang, Y.: Public key distribution scheme for delay tolerant networks on two-channel cryptography. Journal of Network and Computer Applications (2011)
Kate, A., Zaverucha, G., Hengartner, U.: Anonymity and Security in Delay Tolerant Networks. In: 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Secure Communication, pp. 504–513 (2007)
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)
Lauter, K., Mityagin, A.: Security Analysis of KEA Authenticated Key Exchange Protocol. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 378–394. Springer, Heidelberg (2006)
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Technical report CORR 98-05, University of Waterloo (1998)
Mohammad, Z., Chen, Y.-C., Hsu, C.-L., Lo, C.-C.: Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India) 27(3), 252–265 (2010)
National Security Agency: SKIPJACK and KEA algorithm speci cation, Version 2.0 (1998)
Nyberg, K.: On one-pass authenticated key establishment schemes. In: Workshop on Selected Areas in Cryptography (SAC 1995), pp. 2–8 (1995)
Pour, A.N.: Number Theory and Related Algorithms in Cryptography, Master’s thesis, Japan Advanced Institute of Science and Technology, pp. 37–43 (2002)
Song, B., Kim, K.: Comparison of Existing Key Establishment Protocols. In: Information Security and Cryptography, pp. 1–13 (2000)
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification. Request for Comments, RFC 6257, http://datatracker.ietf.org/doc/rfc6257
Van Besien, W.: Dynamic, Non-Interactive Key Management for Bundle Protocol. In: 5th ACM Workshop on Challenged Networks (CHANTS 2010), Illinois (2010)
Wood, L., Eddy, W.M., Holiday, P.: A bundle of problems. In: Aerospace Conference, pp. 1–14 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Menesidou, S.A., Katos, V. (2012). Authenticated Key Exchange (AKE) in Delay Tolerant Networks. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30436-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-30436-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30435-4
Online ISBN: 978-3-642-30436-1
eBook Packages: Computer ScienceComputer Science (R0)