Noisternig, M. ; Hollick, Matthias (2014)
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Montreal, Canada
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Transmission opportunities in delay- and disruption-tolerant networks (DTNs) may be scarce and short-lived. In consequence, the fragmentation of larger messages at intermediate nodes is an important requirement to efficiently utilize any available connectivity. At the same time, bandwidth must be protected against any unauthorized transmission attempt, which implies that source authentication mechanisms are needed. However, naive solutions for supporting both message fragmentation and authentication are inefficient in terms of bandwidth or computational requirements. The problem has been clearly identified in the literature and various solutions have been suggested, but a systematic treatment of the problem has not been carried out so far. In this work, we approach the problem of authenticated fragmentation by rephrasing it as a multicast authentication problem. We identify a number of computationally efficient multicast authentication protocols that are suitable for DTN scenarios and highlight known computational or bandwidth optimality results for two classes of solutions. We generalize the remaining protocols into a single third class and provide a theoretical analysis, which proves the bandwidth optimality of a protocol that has been independently suggested for the authenticated fragmentation problem. We extend the setting of the protocol by considering a network scenario where neighboring nodes can communicate reliably and show theoretically that in this scenario the amortized bandwidth overhead converges to the minimum possible. Finally, we review a number of approaches presented in the literature on the authenticated fragmentation problem and outline their inadequacies.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2014 |
Autor(en): | Noisternig, M. ; Hollick, Matthias |
Art des Eintrags: | Bibliographie |
Titel: | Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks |
Sprache: | Deutsch |
Publikationsjahr: | 2014 |
Buchtitel: | Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14) |
Veranstaltungsort: | Montreal, Canada |
Kurzbeschreibung (Abstract): | Transmission opportunities in delay- and disruption-tolerant networks (DTNs) may be scarce and short-lived. In consequence, the fragmentation of larger messages at intermediate nodes is an important requirement to efficiently utilize any available connectivity. At the same time, bandwidth must be protected against any unauthorized transmission attempt, which implies that source authentication mechanisms are needed. However, naive solutions for supporting both message fragmentation and authentication are inefficient in terms of bandwidth or computational requirements. The problem has been clearly identified in the literature and various solutions have been suggested, but a systematic treatment of the problem has not been carried out so far. In this work, we approach the problem of authenticated fragmentation by rephrasing it as a multicast authentication problem. We identify a number of computationally efficient multicast authentication protocols that are suitable for DTN scenarios and highlight known computational or bandwidth optimality results for two classes of solutions. We generalize the remaining protocols into a single third class and provide a theoretical analysis, which proves the bandwidth optimality of a protocol that has been independently suggested for the authenticated fragmentation problem. We extend the setting of the protocol by considering a network scenario where neighboring nodes can communicate reliably and show theoretically that in this scenario the amortized bandwidth overhead converges to the minimum possible. Finally, we review a number of approaches presented in the literature on the authenticated fragmentation problem and outline their inadequacies. |
Freie Schlagworte: | - SST: CASED:;Mobile Networking;Security;authentication, bundle fragmentation, delay- and disruption-tolerant networking, security |
ID-Nummer: | TUD-CS-2014-1041 |
Fachbereich(e)/-gebiet(e): | 18 Fachbereich Elektrotechnik und Informationstechnik 18 Fachbereich Elektrotechnik und Informationstechnik > Institut für Datentechnik 18 Fachbereich Elektrotechnik und Informationstechnik > Institut für Datentechnik > Multimedia Kommunikation 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt |
Hinterlegungsdatum: | 31 Dez 2016 11:08 |
Letzte Änderung: | 02 Jul 2021 09:56 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |