Security and privacy of IP-ICN coexistence: A comprehensive survey
Today's Internet is experiencing a massive number of users with a continuously increasing
need for data, which is the leading cause of introduced limitations among security and …
need for data, which is the leading cause of introduced limitations among security and …
Current state of multicast routing protocols for disruption tolerant networks: Survey and open issues
KS Wong, TC Wan - Electronics, 2019 - mdpi.com
The deployment of Internet of Things (IoT) applications in remote areas, such as
environmental sensing areas, requires Disruption Tolerant Networking (DTN) support due to …
environmental sensing areas, requires Disruption Tolerant Networking (DTN) support due to …
A scalable and secure group key management method for secure V2V communication
Safety applications based on vehicle-to-everything (V2X) communications can significantly
enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the …
enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the …
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …
architecture solution that can meet today's communication requirements involving nodes in …
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network
J Guo, Y Du, D Zhang, R Wu - Journal of Information Security and …, 2023 - Elsevier
With the rapid development of satellite computing and communication capabilities, Space
Information Network (SIN) makes it possible for users to obtain subscription services …
Information Network (SIN) makes it possible for users to obtain subscription services …
Performance evaluation of a hash-based countermeasure against fake message attacks in sparse mobile ad hoc networks
Y Shimizu, T Kimura, J Cheng - IEICE Transactions on …, 2022 - search.ieice.org
In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which
nodes are chronically isolated. In these networks, messages are delivered to their …
nodes are chronically isolated. In these networks, messages are delivered to their …
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
Routing and secure communication are important concerns in Delay Tolerant Networks
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …
DNA computing in cryptography
J Gao, T **e - Advances in Computers, 2023 - Elsevier
Cryptography is used to prevent any unintentional party from reading or manipulating any
confidential information by converting it from the sender to the receiver and vice versa. It …
confidential information by converting it from the sender to the receiver and vice versa. It …
KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks
As satellite networks grow larger and begin to incorporate interplanetary communication,
there is an increasing interest in the unsolved problem of how to approach PKI in these …
there is an increasing interest in the unsolved problem of how to approach PKI in these …
Toward time synchronization in delay tolerant network based solar system internetworking
A Hylton, N Tsuei, M Ronnenberg… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The expanding presence in space will place an increased dependency on networked
communications-a scalable communications infrastructure; that is, the Solar System Internet …
communications-a scalable communications infrastructure; that is, the Solar System Internet …