Re: [dtn-security] Security for DTN

"HUANG, CHIN-TSER" <> Thu, 03 February 2011 14:46 UTC

Received: from ( []) by (8.13.8/8.13.8) with ESMTP id p13Ekqa9010255; Thu, 3 Feb 2011 06:46:53 -0800
Received: from ([]) by ([]) with mapi; Thu, 3 Feb 2011 09:46:54 -0500
To: "" <>
Date: Thu, 3 Feb 2011 09:42:14 -0500
Thread-Topic: [dtn-security] Security for DTN
Thread-Index: AcvDE/Y1YQuFm7WLRfeVVayF84lWVQAnJaxq
Message-ID: <>
References: <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by id p13Ekqa9010255
Cc: "" <>
Subject: Re: [dtn-security] Security for DTN
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DTN Security Discussion <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 03 Feb 2011 14:46:53 -0000

Hi Shoaib,

Your assumptions, from the starting point, are confusing.
First, if you are talking about physical confidentiality, it's always possible that N1, S, and perhaps another node N2, are all within each other's radio range at one moment. In this case, what do you mean by saying "there exists a confidential channel between N1 and S"? The transmission between N1 and S is also open to N2.
Second, if you are talking about communication confidentiality, there cannot be any confidentiality of the message contents unless they have pre-established shared secret for encryption purpose, or they set up a shared secret on demand. But what's your assumption on that?
My suggestion is that you think about these fundamental issues first before you proceed.

Hope it helps and good luck,
Chin-Tser Huang
Associate Professor
Department of Computer Science
   and Engineering
University of South Carolina
Columbia, SC 29208
+1-803-777-4635 voice
+1-803-777-3767 fax
From: [] On Behalf Of Shoaib Malik []
Sent: Wednesday, February 02, 2011 3:00 PM
Subject: [dtn-security] Security for DTN

I am working on a secure DTN network.

In the DTN network, Suppose a node, say N1, opportunistically becomes available to any other already existing node S, then at that time can we assume that there exist a confidential channel between N1 and S.
In general, "Can we assume that there exist a confidential channel between each hop nodes, in a multi hop network".

Is taking this assumption good or bad while working on security for DTN.