[dtn-security] Security for DTN

Shoaib Malik <shoaibmalik1981@gmail.com> Wed, 02 February 2011 20:00 UTC

Received: from mail-ew0-f41.google.com (mail-ew0-f41.google.com []) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id p12K0Vdv017575; Wed, 2 Feb 2011 12:00:31 -0800
Received: by ewy27 with SMTP id 27so292711ewy.28 for <multiple recipients>; Wed, 02 Feb 2011 12:00:32 -0800 (PST)
MIME-Version: 1.0
Received: by with SMTP id r3mr5102876muh.128.1296676832616; Wed, 02 Feb 2011 12:00:32 -0800 (PST)
Received: by with HTTP; Wed, 2 Feb 2011 12:00:32 -0800 (PST)
Date: Wed, 2 Feb 2011 20:00:32 +0000
Message-ID: <AANLkTikJGn8Uyomdk3ErRsjapRA1VvTiGyWazg+ddMrF@mail.gmail.com>
From: Shoaib Malik <shoaibmalik1981@gmail.com>
To: dtn-security@maillists.intel-research.net
Content-Type: multipart/alternative; boundary=0016e649d994ff24c4049b5219e1
Cc: dtn-interest@maillists.intel-research.net
Subject: [dtn-security] Security for DTN
X-BeenThere: dtn-security@maillists.intel-research.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DTN Security Discussion <dtn-security.maillists.intel-research.net>
List-Unsubscribe: <http://maillists.intel-research.net/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@maillists.intel-research.net?subject=unsubscribe>
List-Archive: <http://maillists.intel-research.net/pipermail/dtn-security>
List-Post: <mailto:dtn-security@maillists.intel-research.net>
List-Help: <mailto:dtn-security-request@maillists.intel-research.net?subject=help>
List-Subscribe: <http://maillists.intel-research.net/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@maillists.intel-research.net?subject=subscribe>
X-List-Received-Date: Wed, 02 Feb 2011 20:00:32 -0000

I am working on a secure DTN network.

In the DTN network, Suppose a node, say N1, opportunistically becomes
available to any other already existing node S, then at that time can we
assume that there exist a confidential channel between N1 and S.
In general, "Can we assume that there exist a confidential channel between
each hop nodes, in a multi hop network".

Is taking this assumption good or bad while working on security for DTN.