A Novel Security Architecture for a Space-Data DTN

  • Nathan L. Clarke
  • Vasilis Katos
  • Sofia-Anna Menesidou
  • Bogdan Ghita
  • Steven Furnell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7277)

Abstract

In this paper we reflect upon the challenges and constraints of a DTN infrastructure handling space data and propose a suitable security architecture for offering security services. The security requirements are expressed in terms of architecture components and supporting security processes. The architecture is provided as a point of reference for validating and evaluating future security controls and processes suitable for space data DTN environments.

Keywords

DTN security DTN secure communications security architecture 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Farrell, A., Symington, S.F., Weiss, H., Lovell, P.: Delay-Tolerant Networking Security Overview, internet-draft (2009), http://tools.ietf.org/html/draft-irtf-dtnrg-sec-overview-06
  2. 2.
    Scott, K., Burleigh, S.: Bundle ProtcolSpecification, Request for Comments, RFC 5050Google Scholar
  3. 3.
    Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification. Request for Comments, RFC 6257Google Scholar
  4. 4.
    Cerf, V., Burleigh, S., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-Tolerant Networking Architecture, RFC 4838 (2007), http://www.ietf.org/rfc/rfc4838.txt
  5. 5.
    Farrell, S.: DTN Key Management Requirements, work in progress as an inter-net-draft (2007), http://tools.ietf.org/html/draft-farrell-dtnrg-km-00
  6. 6.
    Burgin, K., Hennessy, A.: Suite B Ciphersuites for the Bundle Security Proto-col, internet-draft (2012), http://www.ietf.org/id/draft-hennessy-bsp-suiteb-ciphersuites-00.txt
  7. 7.
    Burgin, K., Hennessy, A.: Suite B Profile for the Bundle Security Protocol, internet-draft (2012), http://www.ietf.org/id/draft-hennessy-bsp-suiteb-profile-00.txt
  8. 8.
    Ivancic, W.D.: Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks. In: Aerospace Conference, pp. 1–12 (2010)Google Scholar
  9. 9.
    Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Towards securing disruption-tolerant networking. Technical Report NRC-TR-2007-007 (2007)Google Scholar
  10. 10.
    Kate, A., Zaverucha, G., Hengartner, U.: Anonymity and Security in Delay Tolerant Networks. In: 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Secure Communication, pp. 504–513 (2007)Google Scholar
  11. 11.
    Wood, L., Eddy, W.M., Holiday, P.: A bundle of problems. In: Aerospace Conference, pp. 1–14 (2009)Google Scholar
  12. 12.
    Menesidou, S.A., Katos, V.: Authenticated Key Exchange (AKE) in Delay Tolerant Networks. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 49–60. Springer, Heidelberg (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Nathan L. Clarke
    • 1
    • 2
  • Vasilis Katos
    • 3
  • Sofia-Anna Menesidou
    • 3
  • Bogdan Ghita
    • 1
  • Steven Furnell
    • 1
    • 2
  1. 1.School of Computing and MathematicsPlymouth UniversityPlymouthUnited Kingdom
  2. 2.School of Computing and SecurityEdith Cowan UniversityWestern Australia
  3. 3.Department of Electrical and Computer EngineeringDemocritus University of ThraceGreece

Personalised recommendations