Security and privacy of IP-ICN coexistence: A comprehensive survey

E Bardhi, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's Internet is experiencing a massive number of users with a continuously increasing
need for data, which is the leading cause of introduced limitations among security and …

Current state of multicast routing protocols for disruption tolerant networks: Survey and open issues

KS Wong, TC Wan - Electronics, 2019 - mdpi.com
The deployment of Internet of Things (IoT) applications in remote areas, such as
environmental sensing areas, requires Disruption Tolerant Networking (DTN) support due to …

A scalable and secure group key management method for secure V2V communication

H Aliev, HW Kim, S Choi - Sensors, 2020 - mdpi.com
Safety applications based on vehicle-to-everything (V2X) communications can significantly
enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the …

QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks

MM Mathews, V Panchami - Journal of Information Security and …, 2024 - Elsevier
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …

PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network

J Guo, Y Du, D Zhang, R Wu - Journal of Information Security and …, 2023 - Elsevier
With the rapid development of satellite computing and communication capabilities, Space
Information Network (SIN) makes it possible for users to obtain subscription services …

Performance evaluation of a hash-based countermeasure against fake message attacks in sparse mobile ad hoc networks

Y Shimizu, T Kimura, J Cheng - IEICE Transactions on …, 2022 - search.ieice.org
In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which
nodes are chronically isolated. In these networks, messages are delivered to their …

A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

G Srivastava, R Agrawal, K Singh, R Tripathi… - Peer-to-Peer Networking …, 2020 - Springer
Routing and secure communication are important concerns in Delay Tolerant Networks
(DTNs). Previously designed security schemes utilize traditional public key cryptosystems for …

DNA computing in cryptography

J Gao, T **e - Advances in Computers, 2023 - Elsevier
Cryptography is used to prevent any unintentional party from reading or manipulating any
confidential information by converting it from the sender to the receiver and vice versa. It …

KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks

J Smailes, S Köhler, S Birnbach, M Strohmeier… - arxiv preprint arxiv …, 2024 - arxiv.org
As satellite networks grow larger and begin to incorporate interplanetary communication,
there is an increasing interest in the unsolved problem of how to approach PKI in these …

Toward time synchronization in delay tolerant network based solar system internetworking

A Hylton, N Tsuei, M Ronnenberg… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The expanding presence in space will place an increased dependency on networked
communications-a scalable communications infrastructure; that is, the Solar System Internet …