Secure and Anonymous Communications Over Delay Tolerant Networks

<h3>Abstract</h3><p dir="ltr">Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for su...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Spiridon Bakiras (16896408) (author)
مؤلفون آخرون: Erald Troja (19680139) (author), Xiaohua Xu (115040) (author), Juliano Fischer Naves (19680142) (author)
منشور في: 2020
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513505219051520
author Spiridon Bakiras (16896408)
author2 Erald Troja (19680139)
Xiaohua Xu (115040)
Juliano Fischer Naves (19680142)
author2_role author
author
author
author_facet Spiridon Bakiras (16896408)
Erald Troja (19680139)
Xiaohua Xu (115040)
Juliano Fischer Naves (19680142)
author_role author
dc.creator.none.fl_str_mv Spiridon Bakiras (16896408)
Erald Troja (19680139)
Xiaohua Xu (115040)
Juliano Fischer Naves (19680142)
dc.date.none.fl_str_mv 2020-05-07T03:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2020.2993062
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Secure_and_Anonymous_Communications_Over_Delay_Tolerant_Networks/27037282
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Computer vision and multimedia computation
Cybersecurity and privacy
Anonymous communications
confidentiality
delay tolerant networks
random walks
Routing
Routing protocols
Peer-to-peer computing
Delays
Cryptography
dc.title.none.fl_str_mv Secure and Anonymous Communications Over Delay Tolerant Networks
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <h3>Abstract</h3><p dir="ltr">Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental needs. The contribution and focus of this paper is the study of anonymous communications in the context of Delay Tolerant Networks (DTNs). Current literature achieves anonymity via mechanisms that are built around the onion routing paradigm which, unfortunately, is vulnerable to malicious nodes. Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. We propose two different approaches for encrypting the exchanged messages. The first one is based solely on public key cryptosystems and is, thus, suitable for short, SMS-style messaging. The second one is a hybrid solution that combines both public and symmetric key cryptography and is targeted towards large multimedia messages, such as images or video. Through extensive simulation experiments, we show that our proposed anonymous routing protocol achieves high message delivery rates, while using modest computational resources on the mobile devices.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/deed.en" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2020.2993062" target="_blank">https://dx.doi.org/10.1109/access.2020.2993062</a></p>
eu_rights_str_mv openAccess
id Manara2_55b4849bb89db89db8e333a567069463
identifier_str_mv 10.1109/access.2020.2993062
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/27037282
publishDate 2020
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Secure and Anonymous Communications Over Delay Tolerant NetworksSpiridon Bakiras (16896408)Erald Troja (19680139)Xiaohua Xu (115040)Juliano Fischer Naves (19680142)Information and computing sciencesComputer vision and multimedia computationCybersecurity and privacyAnonymous communicationsconfidentialitydelay tolerant networksrandom walksRoutingRouting protocolsPeer-to-peer computingDelaysCryptography<h3>Abstract</h3><p dir="ltr">Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental needs. The contribution and focus of this paper is the study of anonymous communications in the context of Delay Tolerant Networks (DTNs). Current literature achieves anonymity via mechanisms that are built around the onion routing paradigm which, unfortunately, is vulnerable to malicious nodes. Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. We propose two different approaches for encrypting the exchanged messages. The first one is based solely on public key cryptosystems and is, thus, suitable for short, SMS-style messaging. The second one is a hybrid solution that combines both public and symmetric key cryptography and is targeted towards large multimedia messages, such as images or video. Through extensive simulation experiments, we show that our proposed anonymous routing protocol achieves high message delivery rates, while using modest computational resources on the mobile devices.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/deed.en" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2020.2993062" target="_blank">https://dx.doi.org/10.1109/access.2020.2993062</a></p>2020-05-07T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2020.2993062https://figshare.com/articles/journal_contribution/Secure_and_Anonymous_Communications_Over_Delay_Tolerant_Networks/27037282CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/270372822020-05-07T03:00:00Z
spellingShingle Secure and Anonymous Communications Over Delay Tolerant Networks
Spiridon Bakiras (16896408)
Information and computing sciences
Computer vision and multimedia computation
Cybersecurity and privacy
Anonymous communications
confidentiality
delay tolerant networks
random walks
Routing
Routing protocols
Peer-to-peer computing
Delays
Cryptography
status_str publishedVersion
title Secure and Anonymous Communications Over Delay Tolerant Networks
title_full Secure and Anonymous Communications Over Delay Tolerant Networks
title_fullStr Secure and Anonymous Communications Over Delay Tolerant Networks
title_full_unstemmed Secure and Anonymous Communications Over Delay Tolerant Networks
title_short Secure and Anonymous Communications Over Delay Tolerant Networks
title_sort Secure and Anonymous Communications Over Delay Tolerant Networks
topic Information and computing sciences
Computer vision and multimedia computation
Cybersecurity and privacy
Anonymous communications
confidentiality
delay tolerant networks
random walks
Routing
Routing protocols
Peer-to-peer computing
Delays
Cryptography