Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3288599.3295585acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
short-paper

iSecure: imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTN

Published: 04 January 2019 Publication History

Abstract

Researchers have proposed to set up "infrastructure-less" peer-to-peer opportunistic network (also known as Delay Tolerant Network) using smart phones carried by different victims or volunteers in post-disaster scenario. Volunteers may use this DTN to relay sensitive situational data. However, in such fragile network environment, some malicious nodes may try to intercept, manipulate data with the intention of corruption and fraud. Furthermore, an adversary node may compel a trusted node to compromise its security credentials or may physically capture the node. As a result, attackers get the authority to sign any message on behalf of the compromised node and can launch various attacks to perturb the network. To combat these attacks, we envision a compromise-tolerant DTN, where time-varying pseudonyms are used to obscure the actual identity and safeguard the privacy of genuine nodes. Unique implicit session key agreement facilitates the establishment of credential-free secure communication session between two legitimate nodes and protects the data from being revealed to the adversaries. Periodic certificate revocation scheme restricts use of any compromised credentials beyond a certain time. We evaluate iSecure scheme using ONE simulator to understand feasibility, performance and overhead.

References

[1]
H. Ntareme, M. Zennaro, and B. Pehrson. (2011). Delay Tolerant Network on smartphones : Applications or communication challenged areas, Proceedings of Extreme Com (2011), 1 -- 7.
[2]
A. M. Campillo, J. Crowcroft, E. Yoneki, and R. Mart. (2013). Evaluating opportunistic networks in disaster scenarios, Journal of Network and Computer Applications. 36 (2013), 870--880.
[3]
C. Chakrabarti, and S. Roy. (2015) Adapting Mobility of Observers for Quick Reputation Assignment in a Sparse Post-Disaster Communication Network, IEEE Proceedings of AIMoC (2015), 29--35.
[4]
C. Chakrabarti, S. Roy and S. Basu. (2018). Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN, Peer to Peer Networking and Applications, Springer (2018), 1--19.
[5]
C. Chakrabarti, A. Banerjee and S. Roy. (2014). An Observer-based Distributed Scheme for Selfish-node Detection in a Post-disaster Communication Environment using Delay Tolerant Network, IEEE Proceedings of AIMoC (2014), 151--156.
[6]
R. Canetti, V. Kolesnikov, C. Rackoff and Y. Vahlis. (2014). Secure Key Exchange and Sessions without Credentials. In: Abdalla M., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2014. Lecture Notes in Computer Science, vol 8642. Springer (2014), 40--56.
[7]
R. Jansen, and R Beverly. (2010). Toward anonymity in Delay Tolerant Networks: Threshold Pivot Scheme, Proceedings of the Military Communications Conference MILCOM (2010), 587-- 592.
[8]
M.N.M. Bhutta, H.S. Cruickshank, and Z. Sun. (2014). An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks, Wireless Netw 20 (6) (2014) 20, 1597--1609.
[9]
Y. Ding, X. Zhou, Z. Cheng and W. Zeng. (2013). Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks, Wireless Personal Communication (2013) 70(4), 1473--1485.
[10]
K. Chen and H. Shen. (2016). Distributed Privacy-Protecting Routing in DTN: Concealing the Information Indispensable in Routing, IEEE 14th International Conference SECON (2017), 1--9.
[11]
K. Sakai, M. Sun, W. Ku and J. Wu. (2017). A framework for anonymous routing in delay tolerant networks, IEEE 25th International Conference on Network Protocols ICNP (2017), Canada, 1--10.
[12]
A. Kate, G. M. Zaverucha and U. Hengartner. (2007). Anonymity and Security in Delay Tolerant Networks, in proceedings of Securecom (2007), 504--513.
[13]
S. Basu and S. Roy. (2014). A Group-based Multilayer Encryption Scheme for Secure Dissemination of Post-Disaster Situational Data using Peer-to-Peer Delay Tolerant Network, In Proceedings of IEEE ICACCI, (2014), 1566--1572.
[14]
N. Magaia, C. Borrego, P. Pereira and M. Correia. (2017). PRIVO: A PRIvacypreserVing Opportunistic routing protocol for Delay Tolerant Networks, IFIP (2017), 1--9.
[15]
Y.S. Uddin, D.M. Nicol, T.F. Abdelzaher and R.H. Kravets. (2009). A Post-Disaster Mobility Model For Delay Tolerant Networking, Proceedings of WSC, (2009), 2785--2796.

Cited By

View all
  • (2024)A New Approach for Prevention of Malicious Attack in Post Disaster Using Delay Tolerant Network2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)10.1109/ISCS61804.2024.10581150(1-6)Online publication date: 3-May-2024
  • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
  • (2021)iCredit: A Credit Based Incentive Scheme to Combat Double Spending in Post-Disaster Peer-to-Peer Opportunistic Communication Over Delay Tolerant NetworkWireless Personal Communications: An International Journal10.1007/s11277-021-08829-x121:3(2407-2440)Online publication date: 1-Dec-2021
  • Show More Cited By

Index Terms

  1. iSecure: imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTN

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
      January 2019
      535 pages
      ISBN:9781450360944
      DOI:10.1145/3288599
      • General Chairs:
      • R. C. Hansdah,
      • Dilip Krishnaswamy,
      • Nitin Vaidya
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 January 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anonymity
      2. delay tolerant network
      3. implicit session key
      4. post disaster communication
      5. privacy
      6. pseudonym

      Qualifiers

      • Short-paper

      Conference

      ICDCN '19
      Sponsor:
      • SIGOPS
      • Indian Institute of Science

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A New Approach for Prevention of Malicious Attack in Post Disaster Using Delay Tolerant Network2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)10.1109/ISCS61804.2024.10581150(1-6)Online publication date: 3-May-2024
      • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
      • (2021)iCredit: A Credit Based Incentive Scheme to Combat Double Spending in Post-Disaster Peer-to-Peer Opportunistic Communication Over Delay Tolerant NetworkWireless Personal Communications: An International Journal10.1007/s11277-021-08829-x121:3(2407-2440)Online publication date: 1-Dec-2021
      • (2021)Implementing Data Security in Delay Tolerant Network in Post-disaster ManagementComputational Advancement in Communication, Circuits and Systems10.1007/978-981-16-4035-3_8(77-92)Online publication date: 10-Oct-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media