An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption

Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous con...

Full description

Saved in:
Bibliographic Details
Published in2014 Second International Symposium on Computing and Networking pp. 536 - 542
Main Authors Sudarsono, Amang, Nakanishi, Toru
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2014
Subjects
Online AccessGet full text
ISSN2379-1888
DOI10.1109/CANDAR.2014.34

Cover

Abstract Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous connectivity. However, since the participating nodes are not fully trusted, the secure data exchange mechanism in the DTNs would be strongly desirable. In this paper, we propose an implementation of secure data exchange in the wireless DTNs using Attribute-Based Encryption (ABE) to provide two properties: (i) content data can be accessed by only authorized nodes that are dynamically defined by a policy on the attributes, and (ii) routing messages are attribute-based authenticated such that only the attribute-based authorized nodes can exchange the routing messages.
AbstractList Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay, and losses in wireless communications. In wireless DTNs, content data are exchanged by storing and forwarding approach to enable continuous connectivity. However, since the participating nodes are not fully trusted, the secure data exchange mechanism in the DTNs would be strongly desirable. In this paper, we propose an implementation of secure data exchange in the wireless DTNs using Attribute-Based Encryption (ABE) to provide two properties: (i) content data can be accessed by only authorized nodes that are dynamically defined by a policy on the attributes, and (ii) routing messages are attribute-based authenticated such that only the attribute-based authorized nodes can exchange the routing messages.
Author Sudarsono, Amang
Nakanishi, Toru
Author_xml – sequence: 1
  givenname: Amang
  surname: Sudarsono
  fullname: Sudarsono, Amang
  email: amang@pens.ac.id
  organization: Dept. of Electr. Eng., Electron. Eng. Polytech. Inst. of Surabaya (EEPIS), Surabaya, Indonesia
– sequence: 2
  givenname: Toru
  surname: Nakanishi
  fullname: Nakanishi, Toru
  email: t-nakanishi@hiroshima-u.ac.jp
  organization: Dept. of Inf. Eng., Hiroshima Univ., Higashi-Hiroshima, Japan
BookMark eNot0E9PwjAYgPGaYCIgVy9e3i8w7L-163ECKgnBRDEeSbe9YHXrSFuifHs1enpuv8MzIgPfeyTkitEpY9TczMr1vHyacsrkVMgzMmJSGyNZzvmADLnQJmNFUVyQSYzvlFLBqaRKDElXelh2hxY79Mkm13vod_CM9TEgzG2ysPiq36zfIzgPry5gizHCHFt7gk3fYrA-wRrTZx8-4CU6v4cypeCqY8Ls1kZsYOHrcDr82pfkfGfbiJP_jsnmbrGZPWSrx_vlrFxlTjCWMlkVWrOmUSi0zrUyomGKS86MlNbwqqplXmlUedMYaowqVG0ERVZpVWiUYkyu_1iHiNtDcJ0Np62mPzckF98HxlmI
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CANDAR.2014.34
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1479941522
9781479941520
EndPage 542
ExternalDocumentID 7052242
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i311t-4b8771dd6e37757693d162421944a92bbc45b7e65dd9099686c930e1b7687e43
IEDL.DBID RIE
ISSN 2379-1888
IngestDate Wed Aug 27 02:03:08 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i311t-4b8771dd6e37757693d162421944a92bbc45b7e65dd9099686c930e1b7687e43
PageCount 7
ParticipantIDs ieee_primary_7052242
PublicationCentury 2000
PublicationDate 2014-12
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-12
PublicationDecade 2010
PublicationTitle 2014 Second International Symposium on Computing and Networking
PublicationTitleAbbrev candar
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003204063
ssj0001967840
Score 1.604889
Snippet Recently, Delay Tolerant Networks (DTNs) have been intensively researched to overcome unstable communication due to the intermittent link connection, delay,...
SourceID ieee
SourceType Publisher
StartPage 536
SubjectTerms Ad hoc networks
AES
Attribute-Based Encryption
Communication system security
DTN
Encryption
MAC
Routing
Wireless communication
Title An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption
URI https://ieeexplore.ieee.org/document/7052242
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8MwGA5zJ09TN_GbHDzarmnSpjnWfTAEh8iE3UaTvIXh1snowPnrTdJuE_Hgre0pJG_frzzP-yB0HyuIolBzj1HXumGJlwipTM2Tx1rSKAHtUL7jePTGnqbRtIEe9lwYAHDgM_Dto7vL1yu1sa2yLg9MtsCMwz0yZlZxtQ79FGHcbj23xL7T0JinE1ILKRceMZVePbORBKLbS8f99NUiu5hvNZN_KKu4wDJsoefdkio8ybu_KaWvvn5Na_zvmk9Q50Dhwy_74HSKGlCcodZOwwHXv3QbLdMCuwnBy5qEVOBVjl0XHnA_KzM8-KzIwXheYIuVXRjfiPuwyLZ4slqAiXUlHldgcuwACDgtKxkt8B5NjNR4UKj11rmmDpoMB5PeyKslGLw5JaT0mEw4J1rHQDmPrG6iJpZRQgRjmQilVCySHOJIa2FyzTiJlaABEGmqGA6MnqNmsSrgAmGVERUDqCDJKAs0kznReR6KSGcZpzm7RG27ebOPasjGrN63q78_X6Nje3YVruQGNcv1Bm5NdlDKO2cW3zLOt1Q
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELUqGGDio0V844GRtHFsx_EY2qLyVSFUJLYqti8Sok0RSiXg12M7aYsQA1uSyXKce3eX9-4hdB5r4DwyImDUt25YEiRSaVvz5LFRlCdgPMt3GA-e2M0zf26gi6UWBgA8-Qza7tL_yzczPXetso4IbbbAbMBdt7jPeKXWWnVUpA289eQSd08je0C9lVpEhQyIrfXqqY0klJ1uOuylj47bxdrONfmHt4qHlqstdL9YVMUoeW3PS9XWX7_mNf531duotRLx4YclPO2gBhS7aGvh4oDrj7qJpmmB_YzgaS1DKvAsx74PD7iXlRnuf1TyYPxSYMeWndjoiHswyT7xaDYBi3YlHlZ0cuwpCDgtKyMtCC4tShrcL_T7pw9OLTS66o-6g6A2YQheKCFlwFQiBDEmBioEd86JhjhNCZGMZTJSSjOuBMTcGGmzzTiJtaQhEGXrGAGM7qG1YlbAPsI6IzoG0GGSURYapnJi8jyS3GSZoDk7QE23eeO3aszGuN63w78fn6GNwej-bnx3Pbw9QpvuPVYsk2O0Vr7P4cTmCqU69UfkG_tRuqE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Second+International+Symposium+on+Computing+and+Networking&rft.atitle=An+Implementation+of+Secure+Data+Exchange+in+Wireless+Delay+Tolerant+Network+Using+Attribute-Based+Encryption&rft.au=Sudarsono%2C+Amang&rft.au=Nakanishi%2C+Toru&rft.date=2014-12-01&rft.pub=IEEE&rft.issn=2379-1888&rft.spage=536&rft.epage=542&rft_id=info:doi/10.1109%2FCANDAR.2014.34&rft.externalDocID=7052242
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2379-1888&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2379-1888&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2379-1888&client=summon