Abstract
Mobile ad hoc networks are a subset of delay tolerant networks (DTNs) composed of several mobile devices. These dynamic environments make conventional security algorithms unreliable; nodes located far apart from each other may not have access (available) to each other's public keys or have doubt on the validity of public-keys, making secure message exchange difficult. Furthermore, ad hoc networks are likely to be highly compromised and therefore may be untrusted. Other security methods, such as identity-based encryption and Kerberos, rely on requesting key data from a trusted third party, which can be unavailable or compromised in a DTN like environment. The purpose of this paper is to introduce two security overlay networks capable of delivering messages securely, preventing both eavesdropping and alteration of messages. The first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination node. The second, Fragmenting, separates the message key into pieces that are routed and secured independently from each other. Both techniques improve security in hostile environments; under test conditions, Chaining reduces the number of messages intercepted by 90 %, and Fragmenting by 83 %. This improvement has a performance trade-off, however, reducing the delivery ratio by 63 % in both algorithms.
Recommended Citation
R. Cabaniss et al., "Multi-party Encryption (MPE): Secure Communications in Delay Tolerant Networks," Wireless Networks, vol. 21, no. 4, pp. 1243 - 1258, Springer, May 2015.
The definitive version is available at https://doi.org/10.1007/s11276-014-0848-1
Department(s)
Computer Science
Keywords and Phrases
Chaining encryption; Delay tolerant networks; Fragmented keys; Security; Threshold encryption
International Standard Serial Number (ISSN)
1572-8196; 1022-0038
Document Type
Article - Journal
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2024 Springer, All rights reserved.
Publication Date
01 May 2015