ABSTRACT

This chapter explores how to translate the familiar application-level services and concepts of end-to-end Internet security to a Delay Tolerant networks (DTN). Since the mechanisms by which DTN services are implemented and maintained will be driven by the assumptions, requirements, and constraints of the DTN operating environment, the chapter explains common security services and examines what challenges are unique to a DTN. The chapter also explains how those challenges lead to the creation of a new security model, and reviews some emerging security protocols to implement that model. It provides best practices, policies, and configurations for securing networks. Network security can be categorized into services relating to confidentiality, integrity, authentication, and availability. Ciphers are the core algorithms that implement the aforementioned security services. The user layer has a single security responsibility as it related to secure data exchange in a DTN. The Bundle Protocol is used for end-to-end data exchange in a DTN.