Automated key exchange protocol evaluation in delay tolerant networks

Authors: Menesidou, S.A., Vardalis, D. and Katos, V.

Journal: Computers and Security

Volume: 59

Pages: 1-8

ISSN: 0167-4048

DOI: 10.1016/j.cose.2016.02.006

Abstract:

Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions that DTNs typically operate in, rather than the actual features of the underlying key management cryptographic protocols and solutions. In this paper we propose a framework for evaluation of key exchange protocols in a DTN setting. Our contribution is twofold as the proposed framework can be used as a decision making tool for automated evaluation of various communication scenarios with regards to routing decisions and as part of a method for protocol evaluation in DTNs.

https://eprints.bournemouth.ac.uk/24346/

Source: Scopus

Automated key exchange protocol evaluation in delay tolerant networks

Authors: Menesidou, S.A., Vardalis, D. and Katos, V.

Journal: COMPUTERS & SECURITY

Volume: 59

Pages: 1-8

eISSN: 1872-6208

ISSN: 0167-4048

DOI: 10.1016/j.cose.2016.02.006

https://eprints.bournemouth.ac.uk/24346/

Source: Web of Science (Lite)

Automated key exchange protocol evaluation in delay tolerant networks

Authors: Menesidou, S., Vardalis, D. and Katos, V.

Journal: Computers and Security

Volume: 59

Pages: 1-8

ISSN: 1872-6208

DOI: 10.1016/j.cose.2016.02.006

https://eprints.bournemouth.ac.uk/24346/

Source: Manual

Automated key exchange protocol evaluation in delay tolerant networks

Authors: Menesidou, S., Vardalis, D. and Katos, V.

Journal: Computers and Security

Volume: 59

Pages: 1-8

ISSN: 1872-6208

Abstract:

Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions DTNs typically operate in, rather than the actual features of the underlying key management cryptographic protocols and solutions. In this paper we propose a framework for evaluation of key ex- change protocols in a DTN setting. Our contribution is twofold as the proposed framework can be used as a decision making tool for automated evaluation of various communication scenarios with regards to routing decisions and as part of a method for protocol evaluation in DTNs.

https://eprints.bournemouth.ac.uk/24346/

Source: BURO EPrints