Abstract
In this paper we reflect upon the challenges and constraints of a DTN infrastructure handling space data and propose a suitable security architecture for offering security services. The security requirements are expressed in terms of architecture components and supporting security processes. The architecture is provided as a point of reference for validating and evaluating future security controls and processes suitable for space data DTN environments.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Farrell, A., Symington, S.F., Weiss, H., Lovell, P.: Delay-Tolerant Networking Security Overview, internet-draft (2009), http://tools.ietf.org/html/draft-irtf-dtnrg-sec-overview-06
Scott, K., Burleigh, S.: Bundle ProtcolSpecification, Request for Comments, RFC 5050
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification. Request for Comments, RFC 6257
Cerf, V., Burleigh, S., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-Tolerant Networking Architecture, RFC 4838 (2007), http://www.ietf.org/rfc/rfc4838.txt
Farrell, S.: DTN Key Management Requirements, work in progress as an inter-net-draft (2007), http://tools.ietf.org/html/draft-farrell-dtnrg-km-00
Burgin, K., Hennessy, A.: Suite B Ciphersuites for the Bundle Security Proto-col, internet-draft (2012), http://www.ietf.org/id/draft-hennessy-bsp-suiteb-ciphersuites-00.txt
Burgin, K., Hennessy, A.: Suite B Profile for the Bundle Security Protocol, internet-draft (2012), http://www.ietf.org/id/draft-hennessy-bsp-suiteb-profile-00.txt
Ivancic, W.D.: Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks. In: Aerospace Conference, pp. 1–12 (2010)
Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Towards securing disruption-tolerant networking. Technical Report NRC-TR-2007-007 (2007)
Kate, A., Zaverucha, G., Hengartner, U.: Anonymity and Security in Delay Tolerant Networks. In: 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Secure Communication, pp. 504–513 (2007)
Wood, L., Eddy, W.M., Holiday, P.: A bundle of problems. In: Aerospace Conference, pp. 1–14 (2009)
Menesidou, S.A., Katos, V.: Authenticated Key Exchange (AKE) in Delay Tolerant Networks. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 49–60. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clarke, N.L., Katos, V., Menesidou, SA., Ghita, B., Furnell, S. (2012). A Novel Security Architecture for a Space-Data DTN. In: Koucheryavy, Y., Mamatas, L., Matta, I., Tsaoussidis, V. (eds) Wired/Wireless Internet Communication. WWIC 2012. Lecture Notes in Computer Science, vol 7277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30630-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-30630-3_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30629-7
Online ISBN: 978-3-642-30630-3
eBook Packages: Computer ScienceComputer Science (R0)