2020
DOI: 10.21203/rs.3.rs-31282/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Key Management Scheme in Opportunistic Networks Based on Distributed Storage

Abstract: Aiming at the difficulty of key distribution and identity authentication in the opportunistic network, this paper proposes a self-organized public key management scheme. This solution solves the problem of nodes in the opportunistic network through distributed storage of public keys and public key strengthening mechanisms. The problem of difficult key distribution caused by poor connectivity. Simulation experiments show that the scheme can effectively guarantee secure communication and has good anti-attack abi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…They are immutable and cannot be modified once deployed on the Blockchain.. Blockchain has numerous applications in various fields, including key management and data integrity. Several studies have utilized Blockchain technology, such as those presented in [3,[9][10][11][12][13].…”
Section: Types Of Blockchain Technologymentioning
confidence: 99%
“…They are immutable and cannot be modified once deployed on the Blockchain.. Blockchain has numerous applications in various fields, including key management and data integrity. Several studies have utilized Blockchain technology, such as those presented in [3,[9][10][11][12][13].…”
Section: Types Of Blockchain Technologymentioning
confidence: 99%