Manghui Tu, Kyle W. Riordan, Geyang Xie, Shuhui Yang
{"title":"A secure contact protocol for delay tolerant networks","authors":"Manghui Tu, Kyle W. Riordan, Geyang Xie, Shuhui Yang","doi":"10.1109/ICIS.2017.7959960","DOIUrl":null,"url":null,"abstract":"Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability are urgently needed. The objective of this research is to address these issues by identifying DTN system vulnerabilities and potential threats, and providing potential countermeasures. We first illustrate vulnerabilities of the epidemic based contact history propagation protocol and then identify the potential threats to system performance, availability, and integrity as well as countermeasures to prevent such threats existing in DTN networks. A secure contact protocol is developed for DTN network with epidemic based contact history propagation protocol and simulations are conducted to assess its effectiveness on attack detection.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2017.7959960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability are urgently needed. The objective of this research is to address these issues by identifying DTN system vulnerabilities and potential threats, and providing potential countermeasures. We first illustrate vulnerabilities of the epidemic based contact history propagation protocol and then identify the potential threats to system performance, availability, and integrity as well as countermeasures to prevent such threats existing in DTN networks. A secure contact protocol is developed for DTN network with epidemic based contact history propagation protocol and simulations are conducted to assess its effectiveness on attack detection.