Cryptographic key management in delay tolerant networks: A survey
Authors: Menesidou, S.A., Katos, V., Kambourakis, G.
Journal: Future Internet
Publication Date: 27/06/2017
Volume: 9
Issue: 3
eISSN: 1999-5903
DOI: 10.3390/fi9030026
Abstract:Since their appearance at the dawn of the second millennium, Delay or Disruption TolerantNetworks (DTNs) have gradually evolved, spurring the development of a variety of methods andprotocols for making them more secure and resilient. In this context, perhaps, the most challengingproblem to deal with is that of cryptographic key management. To the best of our knowledge,the work at hand is the first to survey the relevant literature and classify the various so far proposedkey management approaches in such a restricted and harsh environment. Towards this goal, we havegrouped the surveyed key management methods into three major categories depending on whetherthe particular method copes with (a) security initialization, (b) key establishment, and (c) key revocation.We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-datemethods in a generalized way with the aim of offering a central reference point for future research.
https://eprints.bournemouth.ac.uk/29406/
Source: Scopus
Cryptographic Key Management in Delay Tolerant Networks: A Survey
Authors: Menesidou, S.A., Katos, V., Kambourakis, G.
Journal: FUTURE INTERNET
Publication Date: 2017
Volume: 9
Issue: 3
eISSN: 1999-5903
DOI: 10.3390/fi9030026
https://eprints.bournemouth.ac.uk/29406/
Source: Web of Science
Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey
Authors: Menesidou, S., Katos, V., Kambourakis, G.
Journal: Future Internet
Publication Date: 24/06/2017
Publisher: MDPI AG
ISSN: 1999-5903
https://eprints.bournemouth.ac.uk/29406/
Source: Manual