Opportunistic key management in delay tolerant networks
Authors: Menesidou, S.A. and Katos, V.
Journal: International Journal of Information and Computer Security
Volume: 9
Issue: 3
Pages: 212-228
eISSN: 1744-1773
ISSN: 1744-1765
DOI: 10.1504/IJICS.2017.085136
Abstract:Key management is considered to be a challenging task in delay tolerant networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed-loop communications. In this paper, we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilised when used in conjunction with routing decisions by security aware DTN nodes.
https://eprints.bournemouth.ac.uk/24342/
Source: Scopus
Opportunistic Key Management in Delay Tolerant Networks
Authors: Menesidou, S. and Katos, V.
Journal: Int. J. of Information and Computer Security
https://eprints.bournemouth.ac.uk/24342/
Source: Manual
Opportunistic Key Management in Delay Tolerant Networks
Authors: Menesidou, S. and Katos, V.
Journal: International Journal of Information and Computer Security
Volume: 9
Issue: 3
Pages: 212-228
ISSN: 1744-1765
Abstract:Key Management is considered to be a challenging task in Delay Tolerant Networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed loop communications. In this paper we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilized when used in conjunction with routing decisions by security aware DTN nodes.
https://eprints.bournemouth.ac.uk/24342/
http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics
Source: BURO EPrints