Article ID Journal Published Year Pages File Type
453819 Computers & Electrical Engineering 2010 7 Pages PDF
Abstract

Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,