Detecting colluding blackhole and greyhole attacks in delay tolerant networks
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long
delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole …
delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole …
Safety challenges and solutions in mobile social networks
Y Najaflou, B Jedari, F ** your neighbor to find a space
Cooperation between vehicles facilitates traffic management, road safety and infotainment
applications. Cooperation, however, requires trust in the validity of the received information …
applications. Cooperation, however, requires trust in the validity of the received information …
Cryptographic key management in delay tolerant networks: A survey
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant
Networks (DTNs) have gradually evolved, spurring the development of a variety of methods …
Networks (DTNs) have gradually evolved, spurring the development of a variety of methods …
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
A delay tolerant network (DTN) is a store carry and forward network characterized by highly
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …
{V'CER}: Efficient Certificate Validation in Constrained Networks
We address the challenging problem of efficient trust establishment in constrained networks,
ie, networks that are composed of a large and dynamic set of (possibly heterogeneous) …
ie, networks that are composed of a large and dynamic set of (possibly heterogeneous) …
A privacy-preserving and secure framework for opportunistic routing in DTNs
Opportunistic routing has been extensively studied and utilized in delay/disruption-tolerant
networks. The extensive use of nodes' local information, eg, the distance to the destination …
networks. The extensive use of nodes' local information, eg, the distance to the destination …
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
Routing and secure communication are important concerns in Delay Tolerant Networks
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …
Non-interactive key establishment for bundle security protocol of space DTNs
To ensure the authenticity, integrity, and confidentiality of bundles, the in-transit Protocol
Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the …
Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the …