Group Key Exchange Management in Delay Tolerant Network
نویسندگان
چکیده
منابع مشابه
Delay Management in Delay Tolerant Network
In delay tolerant networks (DTN), nodes explore various opportunities to connect and communicate with each other. A series of encounters of different nodes will create such opportunities and spread a message among many nodes and eventually deliver to the designated destination. We study one common DTN scenario where the message exchanges happen when nodes meet others at certain locations. In th...
متن کاملDecentralised Key Management for Delay Tolerant Networks
Advances in ubiquitous mobile computing has given rise to the pervasive deployment of physical devices embedded with sensors, software, and wireless communications that collect and exchange data. These devices are adept for deployment in environments with minimal existing infrastructure, as the devices themselves become the components of a functioning network. With the addition of mobility, the...
متن کاملAuthenticated Key Exchange (AKE) in Delay Tolerant Networks
Key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in space environments. In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol. In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, w...
متن کاملAutomated key exchange protocol evaluation in delay tolerant networks
Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions DTNs typically operate in, rather than the actual features of the underlying key management cryptographic protocols and solutions. In ...
متن کاملCryptographic Key Management in Delay Tolerant Networks: A Survey
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016910165