Abstract
Communication networks operating in challenging environments can be grouped by the concept of Delay/Disruption-Tolerant Networking (DTN). Different protocols can be used in DTN, such as the Bundle Protocol (BP) and the HyperText Transfer Protocol - DTN (HTTP-DTN). In this context, security properties are of fundamental importance in DTN like in regular networks. However, the challenges in DTN hamper the use of traditional security mechanisms. Although BP has been extended to include such mechanisms, there is still no analogous extension for HTTP-DTN. In this paper, we propose the HTTP-DTNSec, a security extension for HTTP-DTN. This extension improves the confidentiality and integrity of HTTP-DTN as well as updates the base protocol for HTTP/2. The proposed extension was implemented as a proof of concept and it was used to perform experiments in a simulated environment. These experiments show that HTTP-DTNSec performed the transfer of packages (i.e., a group of related objects) in a safe manner and with an increase in performance concerning HTTP-DTN. Finally, we provide some concluding remarks and future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Twisted - https://twistedmatrix.com.
- 2.
Hyper-H2 - https://python-hyper.org/projects/hyper-h2/.
- 3.
GnuPG - https://www.gnupg.org/.
- 4.
SQLite https://www.sqlite.org.
References
Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Towards securing disruption-tolerant networking. Nokia Research Center, Tech. rep. NRC-TR-2007-007 (2007)
Belshe, M., Peon, R., Thomson, M.: Hypertext Transfer Protocol Version 2 (HTTP/2). RFC 7540 (May 2015). https://doi.org/10.17487/RFC7540, https://rfc-editor.org/rfc/rfc7540.txt
Bhutta, M.N.M., Cruickshank, H., Nadeem, A.: A framework for key management architecture for DTN (KMAD): requirements and design. In: 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1–4. IEEE (2020)
Birrane, E.J., McKeever, K.: Bundle Protocol Security Specification. Internet-Draft draft-ietf-dtn-bpsec-27, Internet Engineering Task Force (February 2021). https://datatracker.ietf.org/doc/html/draft-ietf-dtn-bpsec-27, work in Progress
Burleigh, S., Fall, K., Birrane, E.J.: Bundle Protocol Version 7. Internet-Draft draft-ietf-dtn-bpbis-31, Internet Engineering Task Force (January 2021). https://datatracker.ietf.org/doc/html/draft-ietf-dtn-bpbis-31, work in Progress
Dalmazo, B.L., Vilela, J.P., Curado, M.: Online traffic prediction in the cloud. Int. J. Netw. Manag. 26(4), 269–285 (2016)
Dalmazo, B.L., Vilela, J.P., Curado, M.: Triple-similarity mechanism for alarm management in the cloud. Comput. Secur. 78, 33–42 (2018)
Ranjan Das, S., Sinha, K., Mukherjee, N., Sinha, B.P.: Delay and disruption tolerant networks: a brief survey. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds.) Intelligent and Cloud Computing. SIST, vol. 194, pp. 297–305. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-5971-6_32
Duarte, P.A.P.R., Nobre, J.C., Granville, L.Z., Tarouco, L.M.R.: A p2p-based self-healing service for network maintenance. In: 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp. 313–320. IEEE (2011)
Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT 2006), pp. 8-pp. IEEE, Pasadena (2006)
Finney, H., Donnerhacke, L., Callas, J., Thayer, R.L., Shaw, D.: OpenPGP Message Format. RFC 4880 (November 2007). https://doi.org/10.17487/RFC4880, https://rfc-editor.org/rfc/rfc4880.txt
Ivancic, W.D.: Security analysis of DTN architecture and bundle protocol specification for space-based networks. In: 2010 IEEE Aerospace Conference, pp. 1–12. IEEE (2010)
Kulkarni, L., Mukhopadhyay, D., Bakal, J.: Analyzing security schemes in delay tolerant networks. In: Satapathy, S., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol. 468. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-1675-2_60
Menesidou, S.A., Katos, V., Kambourakis, G.: Cryptographic key management in delay tolerant networks: a survey. Future Internet 9(3), 26 (2017)
Nobre, J.C., Duarte, P.A.P.R., Granville, L.Z., Tarouco, L.M.R.: Self-* properties and p2p technology on disruption-tolerant management. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp. 000676–000681 (July 2013). https://doi.org/10.1109/ISCC.2013.6755026
Paul, A.B., Biswas, S., Nandi, S., Chakraborty, S.: MATEM: a unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing. J. Netw. Comput. Appl. 104, 1–20 (2018)
Scott, K., Burleigh, S.C.: Bundle Protocol Specification. RFC 5050 (November 2007). https://doi.org/10.17487/RFC5050, https://rfc-editor.org/rfc/rfc5050.txt
Sipos, B.: Delay-Tolerant Networking UDP Convergence Layer Protocol. Internet-Draft draft-sipos-dtn-udpcl-01, Internet Engineering Task Force (March 2021). https://datatracker.ietf.org/doc/html/draft-sipos-dtn-udpcl-01, work in Progress
Sipos, B., Demmer, M., Ott, J., Perreault, S.: Delay-Tolerant Networking TCP Convergence Layer Protocol Version 4. Internet-Draft draft-sipos-dtn-tcpclv4-02, Internet Engineering Task Force (July 2016). https://datatracker.ietf.org/doc/html/draft-sipos-dtn-tcpclv4-02, work in Progress
Torgerson, L., et al.: Delay-Tolerant Networking Architecture. RFC 4838 (April 2007). https://doi.org/10.17487/RFC4838, https://rfc-editor.org/rfc/rfc4838.txt
Urunov, K., Vaqqasov, S., Namgung, J.I., Park, S.H.: Security issues for DTN mechanism of UIoT. In: The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), pp. 1–3. IEEE (2014)
Wood, L., Eddy, W.M., Holliday, P.: A bundle of problems. In: 2009 IEEE Aerospace conference, pp. 1–17. IEEE (2009)
Wood, L., Holliday, P.: Using HTTP for delivery in Delay/Disruption-Tolerant Networks. Internet-Draft draft-wood-dtnrg-http-dtn-delivery-09, Internet Engineering Task Force (June 2014). https://datatracker.ietf.org/doc/html/draft-wood-dtnrg-http-dtn-delivery-09, work in Progress
Wood, L., Holliday, P., Floreani, D., Psaras, I., England, G.: Moving data in DTNS with http and mime making use of http for delay-and disruption-tolerant networks with convergence layers (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Pinto, L.W.P., Dalmazo, B.L., Riker, A., Nobre, J.C. (2021). HTTP-DTNSec: An HTTP-Based Security Extension for Delay/Disruption Tolerant Networking. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2021. ICCSA 2021. Lecture Notes in Computer Science(), vol 12949. Springer, Cham. https://doi.org/10.1007/978-3-030-86653-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-86653-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86652-5
Online ISBN: 978-3-030-86653-2
eBook Packages: Computer ScienceComputer Science (R0)