TU Darmstadt / ULB / TUbiblio

Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks

Noisternig, M. ; Hollick, Matthias (2014)
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Montreal, Canada
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Transmission opportunities in delay- and disruption-tolerant networks (DTNs) may be scarce and short-lived. In consequence, the fragmentation of larger messages at intermediate nodes is an important requirement to efficiently utilize any available connectivity. At the same time, bandwidth must be protected against any unauthorized transmission attempt, which implies that source authentication mechanisms are needed. However, naive solutions for supporting both message fragmentation and authentication are inefficient in terms of bandwidth or computational requirements. The problem has been clearly identified in the literature and various solutions have been suggested, but a systematic treatment of the problem has not been carried out so far. In this work, we approach the problem of authenticated fragmentation by rephrasing it as a multicast authentication problem. We identify a number of computationally efficient multicast authentication protocols that are suitable for DTN scenarios and highlight known computational or bandwidth optimality results for two classes of solutions. We generalize the remaining protocols into a single third class and provide a theoretical analysis, which proves the bandwidth optimality of a protocol that has been independently suggested for the authenticated fragmentation problem. We extend the setting of the protocol by considering a network scenario where neighboring nodes can communicate reliably and show theoretically that in this scenario the amortized bandwidth overhead converges to the minimum possible. Finally, we review a number of approaches presented in the literature on the authenticated fragmentation problem and outline their inadequacies.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2014
Autor(en): Noisternig, M. ; Hollick, Matthias
Art des Eintrags: Bibliographie
Titel: Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks
Sprache: Deutsch
Publikationsjahr: 2014
Buchtitel: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14)
Veranstaltungsort: Montreal, Canada
Kurzbeschreibung (Abstract):

Transmission opportunities in delay- and disruption-tolerant networks (DTNs) may be scarce and short-lived. In consequence, the fragmentation of larger messages at intermediate nodes is an important requirement to efficiently utilize any available connectivity. At the same time, bandwidth must be protected against any unauthorized transmission attempt, which implies that source authentication mechanisms are needed. However, naive solutions for supporting both message fragmentation and authentication are inefficient in terms of bandwidth or computational requirements. The problem has been clearly identified in the literature and various solutions have been suggested, but a systematic treatment of the problem has not been carried out so far. In this work, we approach the problem of authenticated fragmentation by rephrasing it as a multicast authentication problem. We identify a number of computationally efficient multicast authentication protocols that are suitable for DTN scenarios and highlight known computational or bandwidth optimality results for two classes of solutions. We generalize the remaining protocols into a single third class and provide a theoretical analysis, which proves the bandwidth optimality of a protocol that has been independently suggested for the authenticated fragmentation problem. We extend the setting of the protocol by considering a network scenario where neighboring nodes can communicate reliably and show theoretically that in this scenario the amortized bandwidth overhead converges to the minimum possible. Finally, we review a number of approaches presented in the literature on the authenticated fragmentation problem and outline their inadequacies.

Freie Schlagworte: - SST: CASED:;Mobile Networking;Security;authentication, bundle fragmentation, delay- and disruption-tolerant networking, security
ID-Nummer: TUD-CS-2014-1041
Fachbereich(e)/-gebiet(e): 18 Fachbereich Elektrotechnik und Informationstechnik
18 Fachbereich Elektrotechnik und Informationstechnik > Institut für Datentechnik
18 Fachbereich Elektrotechnik und Informationstechnik > Institut für Datentechnik > Multimedia Kommunikation
20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 31 Dez 2016 11:08
Letzte Änderung: 02 Jul 2021 09:56
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen