Menesidou, S. and Katos, V., 2017. Opportunistic Key Management in Delay Tolerant Networks. International Journal of Information and Computer Security, 9 (3), 212-228.
Full text available as:
|
PDF
2016_IJICS.PDF - Accepted Version 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: http://www.inderscience.com/info/ingeneral/forthco...
DOI: 10.1504/IJICS.2017.085136
Abstract
Key Management is considered to be a challenging task in Delay Tolerant Networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed loop communications. In this paper we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilized when used in conjunction with routing decisions by security aware DTN nodes.
Item Type: | Article |
---|---|
ISSN: | 1744-1765 |
Uncontrolled Keywords: | opportunistic key management; security-aware routing decision;delay tolerant networks |
Group: | Faculty of Science & Technology |
ID Code: | 24342 |
Deposited By: | Symplectic RT2 |
Deposited On: | 11 Jul 2016 14:03 |
Last Modified: | 14 Mar 2022 13:57 |
Downloads
Downloads per month over past year
Repository Staff Only - |