Cryptographic Key Management in Delay Tolerant Networks: A Survey
AbstractSince their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment, and (c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research. View Full-Text
Share & Cite This Article
Menesidou, S.A.; Katos, V.; Kambourakis, G. Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet 2017, 9, 26.
Menesidou SA, Katos V, Kambourakis G. Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet. 2017; 9(3):26.Chicago/Turabian Style
Menesidou, Sofia Anna; Katos, Vasilios; Kambourakis, Georgios. 2017. "Cryptographic Key Management in Delay Tolerant Networks: A Survey." Future Internet 9, no. 3: 26.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.