2015
DOI: 10.14257/ijsia.2015.9.4.30
|View full text |Cite
|
Sign up to set email alerts
|

Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…An analysis related to the applicability of IBC in DTN systems by [25] resulted that for authentication IBC had no significant advantage over traditional cryptography. Works such as [45][46][47][48][49] are based on the classic PKI because it is well-examined and recognised. However, PKI schemes are associated with limitations such as server unavailability and cryptographic operations overhead.…”
Section: Public Key Infrastructure (Pki) and Pretty Good Privacy (Pgp)mentioning
confidence: 99%
See 3 more Smart Citations
“…An analysis related to the applicability of IBC in DTN systems by [25] resulted that for authentication IBC had no significant advantage over traditional cryptography. Works such as [45][46][47][48][49] are based on the classic PKI because it is well-examined and recognised. However, PKI schemes are associated with limitations such as server unavailability and cryptographic operations overhead.…”
Section: Public Key Infrastructure (Pki) and Pretty Good Privacy (Pgp)mentioning
confidence: 99%
“…It also achieves end-to-end confidentiality and freshness for end communicating parties. In addition, the authors in [49] propose a secure way of cryptographic key distribution to the DTN nodes. The proposed DTN security architecture offers a way of key distribution and prevention of nodes during possible threats and attacks, while at the same time affords all the security features of BSP.…”
Section: Public Key Infrastructure (Pki) and Pretty Good Privacy (Pgp)mentioning
confidence: 99%
See 2 more Smart Citations
“…[9]. The current issues in DTNs reported in literature are; Reliability [10], [11], Time Synchronization [10], [11], Node Management, Spoof Identity [12], Privacy [13], Key Management [14], Storage Management [15], and Resources Scarcity. The research area of security paid less attention viz-a-viz routing [16] which is the motivation behind this article.…”
Section: Introductionmentioning
confidence: 99%