Abstract
The emergence of DTN as an option for sustaining communication in environments with high delay/frequent disruption have rendered existing access control mechanisms inappropriate hence the need for a new concept in DTN access control. This is primarily due to contradicting assumptions like low delay and constant connectivity on which the existing mechanisms are built. This paper discusses the security issues in DTN, investigate existing access control mechanisms and relate their design principles as well as operational mode to DTN. We proposed a lightweight hierarchical architecture based on AAA architecture concept and explored the DTN architecture to identify those features that will support the implementation of AAA architecture concept. We present the proposed architecture for an intra-domain scenario with a brief description.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House (2006) ISBN 1596930632
Cerf, V., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-Tolerant Networking Architecture. IETF RFC 4838 (April 2007)
Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. SIGCOMM, August 25-29 (2003)
Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., McDonald, P.: When TCP Breaks: Delay- and Disruption Tolerant Networking. IEEE Internet Computing 10(4), 72–78 (2006)
Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF RFC 5050 (November 2007)
Wood, L., Eddy, W., Holliday, P.: A Bundle of Problems. In: IEEE Aerospace Conference, Big Sky, Montana (2009)
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification. Work in progress as an internet-draft, draft-irtf-dtnrg-bundle-security-07. September 9 (2009)
Fall, K., Farrell, S.: DTN: An Architectural Retrospective. IEEE Journal on Selected Areas in Communication (JSAC) 26(5), 828–836 (2008)
Farrell, S., Symington, S., Torgerson, L., Weiss, H., Lovell, P.: Delay-Tolerant Networking Security Overview. Work in progress as an internet-draft, draft-irtf-dtnrg-sec-overview-05, May 5 (2009)
Cruickshank, H., Pillai, P., Noisternig, M., Iyengar, S.: Security Requirement for Unidirectional Lightweight Encapsulation (ULE) Protocol. NWG RFC 5458 (March 2009)
Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)
Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of Access Control Systems. National Institute of Standards and Technology, Interagency Report 7316 (September 2006)
House, T.C.: Client/Server Access: Satellite-ATM Connectivity Using Knowledge Management Approach. In: 4th International Conference on Information Technology: New Generations, Nevada, pp. 863–867 (2007)
Jiang, C., Li, B., Xu, H.: An Efficient Scheme for User Authentication in Wireless Sensor Networks. In: Advanced Information Networking and Applications Workshops, vol. 1, pp. 438–442 (May 2007)
Kim, K., Yang, J.: The Practical System Architecture for the Wireless Sensor Networks. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 547–551 (April 2008)
Khakpour, A.R., Laurent-Maknavicius, M., Chaouchi, H.: WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad Hoc Networks. In: The International Conference on Availability, Reliability and Security, pp. 144–152 (March 2008)
de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA Architecture. NWG RFC 2903 (August 2000)
Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, G., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., Spence, D.: AAA Authorization Framework. NWG RFC 2904 (August 2000)
Nakhjiri, M., Nakhjiri, M.: AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility. John Wiley, Chichester (2005)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, May 6-8, pp. 164–173 (1996)
Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An Integration of Reputation-based and Policy-based Trust Management, http://rewerse.net/publications/download/REWERSE-RP-2005-116.pdf
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust – Management System Version 2. NWG RFC 2704 (September 1999)
Chu, Y., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. Computer Networks and ISDN Systems 29(8-13), 953–964 (1997)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. NWG RFC 2693 (September 1999)
Kagal, L., Finin, T., Joshi, A.: Trust-based Security in Pervasive Computing Environments. IEEE Computer Magazine 34(12), 154–157 (2001)
Blaze, M., Feigenbaum, J., Lacy, J.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Johnson, E., Ansa, G., Cruickshank, H., Sun, Z. (2010). Access Control Framework for Delay/Disruption Tolerant Networks. In: Sithamparanathan, K., Marchese, M., Ruggieri, M., Bisio, I. (eds) Personal Satellite Services. PSATS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 43. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13618-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-13618-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13617-7
Online ISBN: 978-3-642-13618-4
eBook Packages: Computer ScienceComputer Science (R0)