Detecting colluding blackhole and greyhole attacks in delay tolerant networks

TND Pham, CK Yeo - IEEE Transactions on Mobile Computing, 2015‏ - ieeexplore.ieee.org
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long
delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole …

Safety challenges and solutions in mobile social networks

Y Najaflou, B Jedari, F ** your neighbor to find a space
J Timpner, D Schürmann, L Wolf - IEEE Transactions on …, 2015‏ - ieeexplore.ieee.org
Cooperation between vehicles facilitates traffic management, road safety and infotainment
applications. Cooperation, however, requires trust in the validity of the received information …

Cryptographic key management in delay tolerant networks: A survey

SA Menesidou, V Katos, G Kambourakis - Future Internet, 2017‏ - mdpi.com
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant
Networks (DTNs) have gradually evolved, spurring the development of a variety of methods …

Public key distribution scheme for delay tolerant networks based on two-channel cryptography

Z Jia, X Lin, SH Tan, L Li, Y Yang - Journal of Network and Computer …, 2012‏ - Elsevier
A delay tolerant network (DTN) is a store carry and forward network characterized by highly
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …

{V'CER}: Efficient Certificate Validation in Constrained Networks

D Koisser, P Jauernig, G Tsudik… - 31st USENIX Security …, 2022‏ - usenix.org
We address the challenging problem of efficient trust establishment in constrained networks,
ie, networks that are composed of a large and dynamic set of (possibly heterogeneous) …

A privacy-preserving and secure framework for opportunistic routing in DTNs

L Zhang, J Song, J Pan - IEEE Transactions on Vehicular …, 2015‏ - ieeexplore.ieee.org
Opportunistic routing has been extensively studied and utilized in delay/disruption-tolerant
networks. The extensive use of nodes' local information, eg, the distance to the destination …

A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

G Srivastava, R Agrawal, K Singh, R Tripathi… - Peer-to-Peer Networking …, 2020‏ - Springer
Routing and secure communication are important concerns in Delay Tolerant Networks
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …

Non-interactive key establishment for bundle security protocol of space DTNs

X Lv, Y Mu, H Li - IEEE transactions on information forensics …, 2013‏ - ieeexplore.ieee.org
To ensure the authenticity, integrity, and confidentiality of bundles, the in-transit Protocol
Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the …