Next Article in Journal
Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology
Previous Article in Journal
A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
Article Menu

Export Article

Open AccessArticle
Future Internet 2017, 9(3), 26; doi:10.3390/fi9030026

Cryptographic Key Management in Delay Tolerant Networks: A Survey

1
Department of Electrical and Computer Engineering, Democritus University of Thrace, University Campus,Xanthi 67100, Greece
2
Department of Computing and Informatics, Bournemouth University, Poole House, Fern Barrow BH12 5BB,UK
3
Department of Information and Communication Systems Engineering, University of the Aegean,Samos GR-83200, Greece
4
Computer Science Department, George Mason University, Fairfax, VA 22030, USA
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Academic Editor: Dino Giuli
Received: 23 May 2017 / Revised: 23 June 2017 / Accepted: 24 June 2017 / Published: 27 June 2017
View Full-Text   |   Download PDF [768 KB, uploaded 28 June 2017]   |  

Abstract

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment, and (c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research. View Full-Text
Keywords: cryptographic key management; delay tolerant networks; DTN cryptographic key management; delay tolerant networks; DTN
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Menesidou, S.A.; Katos, V.; Kambourakis, G. Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet 2017, 9, 26.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top