Opportunistic key management in delay tolerant networks

Authors: Menesidou, S.A. and Katos, V.

Journal: International Journal of Information and Computer Security

Volume: 9

Issue: 3

Pages: 212-228

eISSN: 1744-1773

ISSN: 1744-1765

DOI: 10.1504/IJICS.2017.085136

Abstract:

Key management is considered to be a challenging task in delay tolerant networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed-loop communications. In this paper, we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilised when used in conjunction with routing decisions by security aware DTN nodes.

https://eprints.bournemouth.ac.uk/24342/

Source: Scopus

Opportunistic Key Management in Delay Tolerant Networks

Authors: Menesidou, S. and Katos, V.

Journal: Int. J. of Information and Computer Security

https://eprints.bournemouth.ac.uk/24342/

Source: Manual

Opportunistic Key Management in Delay Tolerant Networks

Authors: Menesidou, S. and Katos, V.

Journal: International Journal of Information and Computer Security

Volume: 9

Issue: 3

Pages: 212-228

ISSN: 1744-1765

Abstract:

Key Management is considered to be a challenging task in Delay Tolerant Networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed loop communications. In this paper we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilized when used in conjunction with routing decisions by security aware DTN nodes.

https://eprints.bournemouth.ac.uk/24342/

http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics

Source: BURO EPrints