Abstract
Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.
| Original language | English |
|---|---|
| Pages (from-to) | 435-441 |
| Number of pages | 7 |
| Journal | Computers and Electrical Engineering |
| Volume | 36 |
| Issue number | 3 |
| DOIs | |
| State | Published - May 2010 |
| Externally published | Yes |
Keywords
- Anonymous authentication
- Delay tolerant network
- Security