2011
DOI: 10.17487/rfc6257
|View full text |Cite
|
Sign up to set email alerts
|

Bundle Security Protocol Specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
97
0
2

Year Published

2011
2011
2014
2014

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 95 publications
(99 citation statements)
references
References 7 publications
0
97
0
2
Order By: Relevance
“…Regarding security, one of the main challenges in DTNs is how to create and distribute keys and credentials. To this respect, many authors [24], [25] and the current security draft specification for DTN [26] agree that the most promising solution is to use publickey cryptography with digital certificates.…”
Section: Some Applications Of Revocation Forecastingmentioning
confidence: 99%
“…Regarding security, one of the main challenges in DTNs is how to create and distribute keys and credentials. To this respect, many authors [24], [25] and the current security draft specification for DTN [26] agree that the most promising solution is to use publickey cryptography with digital certificates.…”
Section: Some Applications Of Revocation Forecastingmentioning
confidence: 99%
“…The DTN Bundle Security Protocol [RFC6257] defines security-related blocks to provide hop-by-hop authentication, end-to-end authentication, end-to-end confidentiality of bundles or parts of bundles, and an extension security block to provide confidentiality and integrity for extension blocks, as well as a set of standard ciphersuites that may be used to calculate security-results carried in these security blocks. All ciphersuites that use the strict canonicalization algorithm [RFC6257] to calculate and verify security-results (e.g., many hop-by-hop authentication ciphersuites) apply to all blocks in the bundle and so would apply to bundles that include an optional metadata block and would include that block in the calculation of their security-result.…”
Section: Security Considerationsmentioning
confidence: 99%
“…All ciphersuites that use the strict canonicalization algorithm [RFC6257] to calculate and verify security-results (e.g., many hop-by-hop authentication ciphersuites) apply to all blocks in the bundle and so would apply to bundles that include an optional metadata block and would include that block in the calculation of their security-result. In particular, bundles including the optional metadata block would be protected in their entirety for the duration of a single hop, from a forwarding node to an adjacent receiving node (but not from source to destination over multiple hops), using the standard BAB-HMAC (Bundle Authentication Block -Hashed Message Authentication Code) ciphersuite defined in the Bundle Security Protocol.…”
Section: Security Considerationsmentioning
confidence: 99%
“…Meta-data blocks are described in the internet draft entitle "Delay-Tolerant Networking Metadata Extension Block." [10] The Metadata Extension Block is designed to be used to carry application-level information that DTN nodes can use to make DTN-level processing decisions regarding bundles, such as deciding whether to store a bundle or determining to which nodes to forward a bundle.…”
Section: Extensions Security Blockmentioning
confidence: 99%