Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2014, Vol. 8 Issue (6) : 1012-1023    https://doi.org/10.1007/s11704-014-3365-6
RESEARCH ARTICLE
Error- and loss-tolerant bundle fragment authentication for space DTNs
Xixiang LV(), Hui LI
The National Key Lab of Integrated Services Networks, Xidian University, Xi’an 710071, China
 Download: PDF(316 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) suggested using a digital signature directly over each bundle. However, when bundle fragment services are needed, this mechanism suffers from heavy computational costs, bandwidth overheads and energy consumption. In this paper, we address the fragment authentication issue for BP by exploiting the combination of RS error correction and erasure codes with the help of batch transmission characteristic of DTNs. The RS error correction and erasure codes are adopted to allow the receivers to locate the false/injected fragments and reconstruct the only one signature shared by all fragments of a bundle, even if some other fragments are lost or routed to a different path. Getting only partial authentic fragments, a DTN node is able to detect and filter the false/injected fragments, and authenticate the origin of a bundle as well. Such an approach tolerates high delays, unexpected link disruption and the BP nature of routing fragments of the same bundle possibly via different paths. The performance analysis demonstrates that both of our schemes, which follow our generic idea based on RS codes, significantly reduce bandwidth overheads and computational costs as compared to the prior works.

Keywords space-based delay tolerant networks      bundle authentication      information security     
Corresponding Author(s): Xixiang LV   
Issue Date: 27 November 2014
 Cite this article:   
Xixiang LV,Hui LI. Error- and loss-tolerant bundle fragment authentication for space DTNs[J]. Front. Comput. Sci., 2014, 8(6): 1012-1023.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-014-3365-6
https://academic.hep.com.cn/fcs/EN/Y2014/V8/I6/1012
1 The Consultative Committee for Space Data Systems. Rationale, Scenarios, and Requirements for DTN in Space. Draft Informational Report. 2010
2 V Cerf, S Burleigh, A Hooke, L Torgerson, R Durst, K Scott, K Fall, H Weiss. Delay-Tolerant Networking Architecture. RFC4838, 2007-April
3 N Asokan, K Kostianinen, P Ginzboorg, J Ott, C Luo. Towards Securing Disruption-Tolerant Networking. Nokia Research Center Technical Report NRC-TR-2007-007, 2007
4 S Farrell, V Cahill. Security considerations in space and delay tolerant networks. In: Proceedings of 2nd IEEE International Conference on Space Mission Challenges for Information Technology. 2006, 8−38
5 S Symington., S Farrell, H Weiss, P Lovell. Bundle Security Protocol Specification. IRTF, RFC6257, 2011-May
6 R Atkinson, S Kent. Security Architecture for the Internet Protocol. IETF, RFC2401, 1998
7 W Gao, Q Li, B Zhao, G Cao. Multicasting in delay tolerant networks: a social network perspective. In: Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 2009, 299−308
https://doi.org/10.1145/1530748.1530790
8 T Spyropoulos, K Psounis, C Raghavendra. Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Transactions on Networking, 2008, 16(1): 77−90
https://doi.org/10.1109/TNET.2007.897964
9 C Caini, H Cruickshank, S Farrell, M Marchese. Delay-and disruptiontolerant networking (DTN): an alternative solution for future satellite networking applications. Proceedings of the IEEE, 2011, 99(11): 1980−1997
https://doi.org/10.1109/JPROC.2011.2158378
10 S Farrell, S Symington, H Weiss, P Lovell. Delay-tolerant Networking Security Overview. IRTF, DTN research group, 2008
11 DTNRG. Delay Tolerant Networking Research Group: DTN Interest Mailing List Archive. 2005
12 C Partridge. Authentication for fragments. In: Proceedings of the 4th Workshop on Hot Topics in Networks. 2005
13 H Zhu, X Lin, R Lu, X Shen, D Xing, Z Cao. An opportunistic batch bundle authentication scheme for energy constrained DTNs. In: Proceedings of IEEE INFOCOM. 2010, 1−9
14 M Cello, G Gnecco, M Marchese, M Sanguineti. A model of buffer occupancy for icns. IEEE Communications Letters, 2012, 16(6): 862−865
https://doi.org/10.1109/LCOMM.2012.042312.120369
15 R Blahut. Theory and Practice of Error Control Codes. Addison-Wesley, 1983
16 S Lin, Jr D Costello. Error control coding: fundamentals and applications. Proceedings of IEE on Communication, Radar and Signal Processing, 1985, 132(1): 68
17 V Pless. Introduction to the Theory of Error-correcting Codes. Wiley-Interscience, 1998
https://doi.org/10.1002/9781118032749
18 J Van Lint. Introduction to Coding Theory. Springer Verlag, 1999
https://doi.org/10.1007/978-3-642-58575-3
19 L Rizzo. Effective erasure codes for reliable computer communication protocols. ACMSIGCOMM Computer Communication Review, 1997, 27(2): 24−36
https://doi.org/10.1145/263876.263881
20 B Cipra. The ubiquitous reed-solomon codes. SIAM News, 1993, 26(1): 1993
21 A Pannetrat, R Molva. Efficient multicast packet authentication. In: Proceedings of Network and Distributed System Security Symposium. 2003
22 T Cola d, H Ernst, M Marchese. Performance analysis of ccsds file delivery protocol and erasure coding techniques in deep space environments. Computer Networks, 2007, 51(14): 4032−4049
https://doi.org/10.1016/j.comnet.2007.04.015
23 I Bisio, M Marchese, T Cola d. Congestion aware routing strategies for DTN-based interplanetary networks. In: Proceedings of 2008 IEEE Global Telecommunications Conference. 2008, 1−5
24 T Cola d, M Marchese. Joint use of custody transfer and erasure codes in DTN space networks: benefits and shortcomings. In: Proceedings of 2010 IEEE Global Telecommunications Conference. 2010, 1−5
25 T Cola d, M Marchese. Reliable data delivery over deep space networks: benefits of long erasure codes over arq strategies. IEEE Wireless Communications, 2010, 17(2): 57−65
https://doi.org/10.1109/MWC.2010.5450661
26 The Consultative Committee for Space Data Systems. Erasure Correcting Codes for Use in Near Earth and Deep-space Communications. CCSDS 131.5-O-0.2. 2011
27 T Cola d, E Paolini, G Liva, G P Calzolari. Reliability options for data communications in the future deep-space missions. Proceedings of the IEEE, 2011, 99(11): 2056−2074
https://doi.org/10.1109/JPROC.2011.2159571
28 M Fürer. Faster integer multiplication. In: Proceedings of the 39th annual ACM Symposium on Theory of Computing. 2007, 57−66
29 W Peterson. Encoding and error-correction procedures for the bosechaudhuri codes. IRE Transactions on Information Theory, 1960, 6(4): 459−470
https://doi.org/10.1109/TIT.1960.1057586
30 R Chien. Cyclic decoding procedures for bose-chaudhurihocquenghem codes. IEEE Transactions on Information Theory, 1964, 10(4): 357−363
https://doi.org/10.1109/TIT.1964.1053699
31 A Kate, G Zaverucha, U Hengartner. Anonymity and security in delay tolerant networks. In: Proceeding of the 3rd Security and Privacy in Communications Networks and the Workshops, 2007, 504−513
32 R Gallager. Low-density parity-check codes. IRE Transactions on Information Theory, 1962, 8(1): 21−28
https://doi.org/10.1109/TIT.1962.1057683
33 E Birrane. Streamlined Bundle Security Protocol Specification. IETF draft-irtf-dtnrg-sbsp-00, 2014
34 A Krifa, C Baraka, T Spyropoulos. Optimal buffer management policies for delay tolerant networks. In: Proceeding of 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 2008, 260−268
https://doi.org/10.1109/SAHCN.2008.40
35 A S Wander, N Gura, H Eberle, V Gupta, S C Shantz. Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications. 2005, 324−328
https://doi.org/10.1109/PERCOM.2005.18
[1] Bin ZHANG, Jiaxi YE, Ruilin LI, Chao FENG, Yunfei SU, Chaojing TANG. Pusher: an augmented fuzzer based on the connection between input and comparison operand[J]. Front. Comput. Sci., 2022, 16(4): 164206-.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed