2012
DOI: 10.1002/cpe.2885
|View full text |Cite
|
Sign up to set email alerts
|

Practical distributed secret key generation for delay tolerant networks

Abstract: Delay tolerant networks (DTNs) are resource-constrained dynamic networks where a continuous end-to-end connectivity is not always available. In such a challenging network, a fixed infrastructure may not be connected when a DTN is partitioned or the message delay in the network is large. Thus, the traditional public key infrastructure system and identity-based encryption (IBE) system are not suitable for DTNs because they rely on centralized infrastructures and require multiple round-trip interactions. To addre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…To improve security and counter network disruptions, they also propose a distributed way to store public key certificates and certificate revocation list (CRL). The authors in [32] recognise that both traditional PKI system and IBC schemes are not suitable for DTNs because they rely on centralised infrastructures and require multiple round-trip interactions. They propose a distributed secret key generation system with self-certified identity that does not require any PKG and threshold cryptosystem.…”
Section: Security Initializationmentioning
confidence: 99%
“…To improve security and counter network disruptions, they also propose a distributed way to store public key certificates and certificate revocation list (CRL). The authors in [32] recognise that both traditional PKI system and IBC schemes are not suitable for DTNs because they rely on centralised infrastructures and require multiple round-trip interactions. They propose a distributed secret key generation system with self-certified identity that does not require any PKG and threshold cryptosystem.…”
Section: Security Initializationmentioning
confidence: 99%
“…[1][2][3][4][5][6][7][8][9][10][11][12] Among these schemes, extracting secret keys from the characteristics of wireless channels, which makes it possible for one-time pad, becomes a hot issue. Traditional security protocols and algorithms mainly rely on cryptography, hash functions, and some other mathematical properties to support the security services.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the interest in physical layer security schemes, which exploits the inherent physical properties of the wireless medium to complement or enhance the existing cryptosystems, is growing. [1][2][3][4][5][6][7][8][9][10][11][12] Among these schemes, extracting secret keys from the characteristics of wireless channels, which makes it possible for one-time pad, becomes a hot issue. So far, numerous research works have focused on extracting secret keys based on the received signal strength indication, 3,4 channel impulse response, 3,5-7 channel phase 8 and multipath relative-delay, 9 etc in various scenarios.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Delay tolerant networks are resource‐constrained dynamic networks where a continuous end‐to‐end connectivity is not always available. In the sixth paper, ‘Practical Distributed Secret Key Generation for Delay Tolerant Networks’ , Xie and Wang propose a distributed secret key generation system with self‐certified identity (SCI‐DKG), which does not require any private key generator and threshold cryptosystem. They prove that SCI‐DKG is chosen ciphertext secure in the standard model, and it can resist potential network attacks.…”
mentioning
confidence: 99%