Skip to main content

Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey.

Menesidou, S., Katos, V. and Kambourakis, G., 2017. Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey. Future Internet, 3, 26.

Full text available as:

futureinternet-09-00026.pdf - Published Version
Available under License Creative Commons Attribution.

[img] PDF
template.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Attribution.


DOI: 10.3390/fi9030026


Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

Item Type:Article
Uncontrolled Keywords:cryptographic key management; delay tolerant networks; DTN
Group:Faculty of Science & Technology
ID Code:29406
Deposited By: Symplectic RT2
Deposited On:26 Jun 2017 15:28
Last Modified:14 Mar 2022 14:05


Downloads per month over past year

More statistics for this item...
Repository Staff Only -