2013
DOI: 10.1007/978-3-642-36787-8_23
|View full text |Cite
|
Sign up to set email alerts
|

Providing Authentication in Delay/Disruption Tolerant Networking (DTN) Environment

Abstract: Abstract. DTN environment is characterized by intermittent connectivity, high/variable delay, heterogeneity, high error rate and asymmetric data rate amongst others. These characteristics accounts for the poor behavior of Internet protocols in this environment. To address these problems, DTN was conceived and designed together with specialized protocols to carry out its services. Its emergence called for a new concept in security that was considered at the design stage. The main aim of this paper is to propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…For this reason, apart from PKI, IBC has been examined as a viable solution for security within the DTN context. From Tables 2 and 3 it can be observed that few works propose the usage of pre-shared keys or pre-established trust between the nodes [41,47]. However, it is obvious that for scalability reasons such schemes apply only in a small and fixed-size DTNs.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…For this reason, apart from PKI, IBC has been examined as a viable solution for security within the DTN context. From Tables 2 and 3 it can be observed that few works propose the usage of pre-shared keys or pre-established trust between the nodes [41,47]. However, it is obvious that for scalability reasons such schemes apply only in a small and fixed-size DTNs.…”
Section: Discussionmentioning
confidence: 99%
“…An analysis related to the applicability of IBC in DTN systems by [25] resulted that for authentication IBC had no significant advantage over traditional cryptography. Works such as [45][46][47][48][49] are based on the classic PKI because it is well-examined and recognised. However, PKI schemes are associated with limitations such as server unavailability and cryptographic operations overhead.…”
Section: Public Key Infrastructure (Pki) and Pretty Good Privacy (Pgp)mentioning
confidence: 99%
See 2 more Smart Citations
“…Cryptographic key management is the foundation of network security, so it is an indis- [47]. However such schemes apply only in a small and fixed-size DTNs.…”
Section: Key Management Taxonomy In Dtnsmentioning
confidence: 99%