Menesidou, S., Vardalis, D. and Katos, V., 2016. Automated key exchange protocol evaluation in delay tolerant networks. Computers and Security, 59, 1 - 8.
Full text available as:
|
PDF
paper_smvkdv_cose_revised.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 393kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1016/j.cose.2016.02.006
Abstract
Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions DTNs typically operate in, rather than the actual features of the underlying key management cryptographic protocols and solutions. In this paper we propose a framework for evaluation of key ex- change protocols in a DTN setting. Our contribution is twofold as the proposed framework can be used as a decision making tool for automated evaluation of various communication scenarios with regards to routing decisions and as part of a method for protocol evaluation in DTNs.
Item Type: | Article |
---|---|
ISSN: | 1872-6208 |
Uncontrolled Keywords: | delay tolerant networks, protocol evaluation, opportunistic key management, protocol injection, ns-2 |
Group: | Faculty of Science & Technology |
ID Code: | 24346 |
Deposited By: | Symplectic RT2 |
Deposited On: | 11 Jul 2016 14:48 |
Last Modified: | 14 Mar 2022 13:57 |
Downloads
Downloads per month over past year
Repository Staff Only - |