IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v9y2017i3p26-d102744.html
   My bibliography  Save this article

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Author

Listed:
  • Sofia Anna Menesidou

    (Department of Electrical and Computer Engineering, Democritus University of Thrace, University Campus,Xanthi 67100, Greece
    These authors contributed equally to this work.)

  • Vasilios Katos

    (Department of Computing and Informatics, Bournemouth University, Poole House, Fern Barrow BH12 5BB,UK
    These authors contributed equally to this work.)

  • Georgios Kambourakis

    (Department of Information and Communication Systems Engineering, University of the Aegean,Samos GR-83200, Greece
    Computer Science Department, George Mason University, Fairfax, VA 22030, USA
    These authors contributed equally to this work.)

Abstract

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment, and (c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

Suggested Citation

  • Sofia Anna Menesidou & Vasilios Katos & Georgios Kambourakis, 2017. "Cryptographic Key Management in Delay Tolerant Networks: A Survey," Future Internet, MDPI, vol. 9(3), pages 1-21, June.
  • Handle: RePEc:gam:jftint:v:9:y:2017:i:3:p:26-:d:102744
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/9/3/26/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/9/3/26/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:9:y:2017:i:3:p:26-:d:102744. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.