2017
DOI: 10.3390/fi9030026
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Abstract: Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Both CRGK and MCRGK are only able to accommodate small to medium-sized DTN groups. Menesidou, Katos, and Kambourakis [84] surveyed these key establishment methods for group communication as part of their proposed taxonomy and discussed them in details with DTN's security requirements.…”
Section: Group Authenticationmentioning
confidence: 99%
“…Both CRGK and MCRGK are only able to accommodate small to medium-sized DTN groups. Menesidou, Katos, and Kambourakis [84] surveyed these key establishment methods for group communication as part of their proposed taxonomy and discussed them in details with DTN's security requirements.…”
Section: Group Authenticationmentioning
confidence: 99%
“…Any change in the network structure or constraints requires the generation of a new key set. If the key update period is too long, the corresponding key may be exposed [15]. However, if it is too short, unnecessary or meaningless key updates lead to excessive overhead for the key distribution process in a highly dynamic V2X communication environment.…”
mentioning
confidence: 99%