Font Size: a A A

Research On Delay/Disruption Tolerant Networks Information Security

Posted on:2016-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:J PanFull Text:PDF
GTID:2308330482953312Subject:Information security
Abstract/Summary:PDF Full Text Request
With people’s increasing requirement for network application under different scenarios, various kinds of new network have been emerging. For instance, sensor network and space communication network, in these networks, due to the movability of nodes, uniformity of distribution, the limit of node resources and link communication barrier, they lead to long latency, frequent interrupt of the communication link, which is called as Delay/Disruption Tolerant Networks.Since the birth day of the DTN, it has shown its great utilization potentiality in the area of space communication, battlefield communication, rescue after disaster.The special properties of DTN network decide the difference between security requirement and traditional internet network. The wide spread of application and range make the potential safety hazard of DTN more obvious under some special circumstance, which brings great trouble to the development of DTN. In the different application area of DTN, various kind of security threat especially exist in the area of space and military scenarios. Due to the open characteristics of the terrestrial network and space link, it is possible for the data which are transmitted in wireless link the to be monitored, intercepted and captured and some malicious nodes adopt the methods of retransmission and Dos attack to attack the communication nodes in the DTN directly and obtain the useful information and destroy the network operation and facility.In order to realise the interconnection in the different architecture networks, DTN adopt the method of bundle layer, so DTN have to face the more complex security situation which is brought by the different architecture networks. The network situation with long latency and frequent interrupt brings great challenge to traditional sufficient security protocol and security mechanism in the same time it also aggravated the threaten level of potential safety hazard.The healthy DTN cannot develop well without the protection of security technology. The application of DTN will be limited greatly if the research steps of security technology cannot keep going with the development of communication. Therefore, the research of security technology in DTN become an important issues in the current work.This paper does some research in the following aspect:Firstly, the paper gives the analysis of research status of DTN and properties of network architecture under the space circumstance with the emphasis on the protocol architecture of DTN and give detailed description of the key protocol in DTN and Bundle protocol. The paper also describe the system chart, module chart, process chart of DTN network.Secondly, the paper does research on key-share algorithm in DTN. Then it describes the existence of potential safety issue on key-share algorithm based on threshold by Shamir and analyses the communication interaction efficiency concerning key sharing scheme mixed totally as well as problems in regard to computing capacity requirements on the base of which come up with some confusion key-share algorithm with respect to completely confused algorithm. We draw into confusing the queue randomly design in virtue of feedback message timestamp in order to reduce the steps during the process of share on communication nodes. It ensures preferable adaptation in the limited special network environment. The dynamic error correction mechanism is designed so as to reutilize the computation values under the circumstances of failure of share on course of key -share. Not only does this mechanism reduce the consumption on computation and network bandwidth, but also improve the efficiency of key sharing. The time model is established to verify the feasibility of the efficiency of sharing.
Keywords/Search Tags:Delay, Disruption Tolerant Network, Information Security, bundle protocol, key sharing
PDF Full Text Request
Related items