ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm

Journal: International Journal of Computer Techniques (Vol.2, No. 2)

Publication Date:

Authors : ; ;

Page : 51-54

Keywords : Bundle Security; Delay Tolerant Network; Key Management; Time Evolving Network;

Source : Downloadexternal Find it from : Google Scholarexternal


The abstract of this paper is to asure the authenticity, integrity, and confidentiality, the in-transit Protocol Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the Consultative Committee for Space Data Systems bundle security protocol (BSP) specification declares four IP sec style security headers to provide four aspects of security services. In any way, this specification leaves key management as an open problem. Aiming to apply the key establishment issue for Bundle Protocol, in this journal, we utilize a timeevolving topology model and two channel cryptography to design efficient and non interactive key exchange protocol . A time-evolving model is used in formal manner model the periodic and set in advance behavior patterns of space DTNs, and therefore, a system can schedule when and to whom it should send its public key. Meantime, the application of two-channel cryptography enables DTN nodes to replace their public keys or revocation status information, with authentication assurance and in a non interactive manner. The proposed scheme helps to establish a secure environment to defend for BSP, tolerating high delays, and unexpected loss of connectivity of space DTNs.

Last modified: 2015-07-09 15:30:09