2011 4th IFIP International Conference on New Technologies, Mobility and Security 2011
DOI: 10.1109/ntms.2011.5721054
|View full text |Cite
|
Sign up to set email alerts
|

Managing Access Control in Delay/Disruption Tolerant Networking (DTN) Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Johnson et al . proposed a lightweight hierarchical architecture and access control mechanism , and also established the similarity between generic AAA architecture and opportunistic network bundle structure, and demonstrated the applicability of hierarchical framework and AAA concept to the delay/disruption‐tolerant network environment. Their proposed design has the ability to prevent masquerading, modification, and replay attacks, and provides communication efficiency, less load on the server, and less restriction on recipient network connectivity.…”
Section: Authentication and Access Controlmentioning
confidence: 94%
See 1 more Smart Citation
“…Johnson et al . proposed a lightweight hierarchical architecture and access control mechanism , and also established the similarity between generic AAA architecture and opportunistic network bundle structure, and demonstrated the applicability of hierarchical framework and AAA concept to the delay/disruption‐tolerant network environment. Their proposed design has the ability to prevent masquerading, modification, and replay attacks, and provides communication efficiency, less load on the server, and less restriction on recipient network connectivity.…”
Section: Authentication and Access Controlmentioning
confidence: 94%
“…Because of the scarcity of opportunistic network resource, node access control is necessary to protect the network from unauthenticated entities and prevent unauthorized entities from using network resource . There are three access control management frameworks, which are centralized, distributed, and hierarchical framework for different network environments , while hierarchical access control framework is the preferred solution for Oppnets .…”
Section: Authentication and Access Controlmentioning
confidence: 99%
“…It is also identified to provide partial trust management since it does not bind identity to access rights. To address the above issues, we proposed an asymmetric based APass introduced in [10] and shown in fig. 2 which is a modification of the digital certificate.…”
Section: The Proposed Apassmentioning
confidence: 99%