University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Engineering Privacy by Design For Delay Tolerant Networks.

Ahmad, Naveed. (2013) Engineering Privacy by Design For Delay Tolerant Networks. Doctoral thesis, University of Surrey (United Kingdom)..

[img]
Preview
Text
27558219.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (9MB) | Preview

Abstract

Delay Tolerant Network (DTN), represent a class of networks where continuous end-to-end connectivity may not be possible, and even when it does exists, then it is highly delayed or disrupted. DTN is a well recognized area in networking research and has attracted extensive attention from both network designers and application developers. Applications of this emerging communication paradigm are wide and include sensor networks, satellite and space communication and Rural Area DTN (RA-DTN) for providing connectivity in developing regions. The real challenge for DTN in general and RA-DTN in particular is to hide end user identities by providing a level of privacy through anonymity and pseudonymity. Privacy is a value shared by most human societies, and thus it is no longer an inherent assumption; rather it has becomes a property that must be explicitly designed. Privacy by Design (PbD) is a new paradigm to achieve privacy from the design level rather an add on functionality. This work engineered PbD and has accomplished privacy through Privacy by Architecture (PbA), Privacy by Resolution (PbR) and Privacy by Revocation (PbRe) mechanisms. This thesis proposes a privacy solution for DTN in three phases; where the first two phases incorporate PbA concept while the third phase is embedded with PbR and PbRe. The first phase, Pseudonym Credential Phase, allow users to generate a blinded Pseudonym Credential from a Verifying Certificate Authority (VCA), which verify user through digital certificate. Our approach is based on Blind Signature which prevents Certificate Authority from learning linking information about the user and content of the Pseudonym Credential. The second phase, Pseudonym Certificate Issuance Phase, facilitates users to anonymously authenticate to Issuing Certificate Authority (ICA) and obtained multiple Pseudonym Identities and Pseudonym Certificates. Our approach is based on the idea of embedding half resolution information directly in the Pseudonym Identity and the rest has been distributed in VCA and ICA. The third phase, Pseudonym Resolution and Revocation Phase, enforces several ICAs and VCA which further cooperates for pseudonym-identity resolution and revocation at legitimate situations without entrusting any one of them. The proposed protocols have been verified and validated through formal modeling in CasperFDR, also the study has employed an information theoretic quantification for different size of the system.

Item Type: Thesis (Doctoral)
Divisions : Theses
Authors : Ahmad, Naveed.
Date : 2013
Additional Information : Thesis (Ph.D.)--University of Surrey (United Kingdom), 2013.
Depositing User : EPrints Services
Date Deposited : 24 Apr 2020 15:26
Last Modified : 24 Apr 2020 15:26
URI: http://epubs.surrey.ac.uk/id/eprint/855045

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800