Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey.

Menesidou, S., Katos, V. and Kambourakis, G., 2017. Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey. Future Internet, 3, 26.

Full text available as:

[img] PDF
template.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Attribution.

1MB
[img]
Preview
PDF
futureinternet-09-00026.pdf - Published Version
Available under License Creative Commons Attribution.

785kB

DOI: 10.3390/fi9030026

Abstract

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

Item Type:Article
ISSN:1999-5903
Uncontrolled Keywords:cryptographic key management; delay tolerant networks; DTN
Group:Faculty of Science & Technology
ID Code:29406
Deposited By: Unnamed user with email symplectic@symplectic
Deposited On:26 Jun 2017 15:28
Last Modified:03 Jul 2017 14:36

Downloads

Downloads per month over past year

More statistics for this item...
Repository Staff Only -