2012 6th Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop ( 2012
DOI: 10.1109/asms-spsc.2012.6333112
|View full text |Cite
|
Sign up to set email alerts
|

Moon to earth DTN communications through lunar relay satellites

Abstract: Although Delay-/DisruptionTolerant Networking, which originated from research on an Interplanetary Internet, has enlarged its scope to encompass all challenged networks, space applications are still one of its most important application fields. This paper deals with DTN communication from Moon to Earth, based on the use of a lunar satellite acting as a "data-mule" to collect data from a Lander located on the far side of the Moon. To make the scenario more interesting and complex from the point of view of possi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
11
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 16 publications
(26 reference statements)
1
11
0
Order By: Relevance
“…On the positive side, during the present experiments, we found that an incompatibility issue between BAB and TCP on two hop tests, pointed out in Ref. [18], has now been completely resolved.…”
Section: Masqueradingmentioning
confidence: 76%
See 3 more Smart Citations
“…On the positive side, during the present experiments, we found that an incompatibility issue between BAB and TCP on two hop tests, pointed out in Ref. [18], has now been completely resolved.…”
Section: Masqueradingmentioning
confidence: 76%
“…The experiments described in this section, partially presented in Ref. [18], are to the best of the authors' knowledge, the first tests of the BSP ION implementation presented in the open literature.…”
Section: Security Considerations and Bsp Experimentsmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 2 shows how PIB is used to check the authentication and the integrity for multiple hops, usually between endto-end or consecutive nodes. The PIB may be verified by any node to find the PIB-source but does not need to check with the PIB-destination because the key needs to verify the PIB authenticator will be the public key associated with the PIB-source [7].…”
Section: Figure 1 Bab For Hop-to-hop Security Checkmentioning
confidence: 99%