Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Future Internet  /  Vol: 9 Par: 3 (2017)  /  Artículo
ARTÍCULO
TITULO

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Sofia Anna Menesidou    
Vasilios Katos and Georgios Kambourakis    

Resumen

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment, and (c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

 Artículos similares

       
 
Jiaying Yao, Zhigeng Han, Muhammad Sohail and Liangmin Wang    
5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today?s commercial telecommunications networks. Howev... ver más
Revista: Future Internet

 
Sofia Anna Menesidou, Vasilios Katos and Georgios Kambourakis    
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, p... ver más
Revista: Future Internet