Privacy by Architecture Pseudonym Framework for Delay Tolerant Network

Ahmad, Naveed, Cruickshank, Haitham, Cao, Yue, Khan, Fakhri Alam, Asif, Mohammad, Ahmad, Awais and Jeon, Gwanggil (2019) Privacy by Architecture Pseudonym Framework for Delay Tolerant Network. Future Generation Computer Systems, 93. pp. 979-992. ISSN 0167-739X

Full text not available from this repository. (Request a copy)
Official URL:


Delay Tolerant Network (DTN) enables communication in opportunistic networks where disruptive links result into intermittent connectivity. Routing protocols in such opportunistic environments mainly rely on broadcast/multicast communication in order to maximize the chances of packet delivery to destination node. Lack of end-to-end path and the essential requirement of store-carry-forward decision of packets by intermediate nodes, pose a serious threat to security and privacy concerns in DTNs. This article proposes a novel approach for secure and private communication in DTNs by hiding the identity of nodes using pseudonyms. The approach is based on Privacy by Architecture (PbA) where minimal identifying information of a user is sent to a certificate authority (CA) while requesting for a certificate. The novel PbA based scheme is composed of a set of protocols to address the aforementioned challenges; the Pseudonym Credential and Pseudonym Identity/Certificate Issuance protocols. The proposed approach is validated using formal modeling in CasperFDR which is the state-of-the art compiler for performance analysis of security protocols. To strengthen our claim, an information theoretic quantification method is employed to measure the Degree of Anonymity (DoA) of the approach. The approach performs efficiently and requires no end-to-end connectivity for messages exchange between the user and the certificate authority, thus making it an ideal choice for ensuring security and privacy in DTNs. Results show that the proposed approach guards against privacy attacks and delivers a high degree of anonymity even in the presence of compromised nodes in the network.

Item Type: Article
Uncontrolled Keywords: Delay Tolerant Network, Privacy, Anonymity, Pseudonymity, Quantifying anonymity, Formal modeling
Subjects: G400 Computer Science
G500 Information Systems
G600 Software Engineering
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Elena Carlaw
Date Deposited: 07 Mar 2019 10:02
Last Modified: 10 Oct 2019 21:46

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics