Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
Journal: International Journal of Computer Techniques (Vol.2, No. 2)Publication Date: 2015-03-01
Authors : E.Mukundhan; R.Veeramani;
Page : 51-54
Keywords : Bundle Security; Delay Tolerant Network; Key Management; Time Evolving Network;
Abstract
The abstract of this paper is to asure the authenticity, integrity, and confidentiality, the in-transit Protocol Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the Consultative Committee for Space Data Systems bundle security protocol (BSP) specification declares four IP sec style security headers to provide four aspects of security services. In any way, this specification leaves key management as an open problem. Aiming to apply the key establishment issue for Bundle Protocol, in this journal, we utilize a timeevolving topology model and two channel cryptography to design efficient and non interactive key exchange protocol . A time-evolving model is used in formal manner model the periodic and set in advance behavior patterns of space DTNs, and therefore, a system can schedule when and to whom it should send its public key. Meantime, the application of two-channel cryptography enables DTN nodes to replace their public keys or revocation status information, with authentication assurance and in a non interactive manner. The proposed scheme helps to establish a secure environment to defend for BSP, tolerating high delays, and unexpected loss of connectivity of space DTNs.
Other Latest Articles
- Study of Symmetric key Cryptography Algorithms
- Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
- PROFICIENT APPROACH OF DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING REGENERATING CODE
- PRIVACY ENHANCING AND PROTECTED DISTRIBUTED OF PERSONAL HEALTH RECORD USING ABE
- Service Delegating Log Management-For Secure Logging In Cloud Environment
Last modified: 2015-07-09 15:30:09