Security considerations in space and delay tolerant networks

S Farrell, V Cahill - … for Information Technology (SMC-IT'06), 2006 - ieeexplore.ieee.org
This paper reviews the Internet-inspired security work on delay tolerant networking, in
particular, as it might apply to space missions, and identifies some challenges arising, for …

Privacy and confidentiality in context-based and epidemic forwarding

A Shikfa, M Önen, R Molva - Computer Communications, 2010 - Elsevier
Autonomic and opportunistic communications require specific routing algorithms, like
replication-based algorithms or context-based forwarding. In addition to confidentiality …

Delay/disruption tolerant network and its application in military communications

Z Lu, J Fan - 2010 International Conference On Computer …, 2010 - ieeexplore.ieee.org
With the gradual deepening and development of modern military warfare towards Network
Centric Warfare (NCW), the performance of network protocols will play an important role …

Public key distribution scheme for delay tolerant networks based on two-channel cryptography

Z Jia, X Lin, SH Tan, L Li, Y Yang - Journal of Network and Computer …, 2012 - Elsevier
A delay tolerant network (DTN) is a store carry and forward network characterized by highly
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …

An introduction to delay and disruption tolerant networks (DTNs)

JJPC Rodrigues, VNGJ Soares - Advances in Delay-Tolerant Networks …, 2021 - Elsevier
Delay and disruption tolerant networking (DTN) is an exciting research topic that has
attracted increasing attention from many researchers. It focuses on the design, construction …

An efficient, scalable key transport scheme (eskts) for delay/disruption tolerant networks

MNM Bhutta, HS Cruickshank, Z Sun - Wireless networks, 2014 - Springer
In the past, security protocols including key transport protocols are designed with the
assumption that there are two parties communication with each other and an adversary tries …

ID based cryptography and anonymity in delay/disruption tolerant networks

N Ahmad, H Cruickshank, Z Sun - Personal Satellite Services: Second …, 2010 - Springer
Due to the rapid development in technology, every network, application needs full time
connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) …

[PDF][PDF] Securing kiosknet: A systems approach

SU Rahman, U Hengartner, U Ismail… - University of Waterloo …, 2007 - cs.uwaterloo.ca
Internet kiosks typically provide weak security guarantees and therefore cannot support
secure web access or transactionoriented applications such as banking and bill payment …

Security for Rural Public Computing

S Ur Rahman - 2008 - uwspace.uwaterloo.ca
Current research on securing public computing infrastructure like Internet kiosks has
focused on the use of smartphones to establish trust in a computing platform or to offload the …

[PDF][PDF] Secure key establishment for bundle security protocol of space DTNs in noninteractive manner

C Jadhav, B Dhainje, K Pradeep - Int. J. Comput. Sci. Inf. Technol, 2015 - Citeseer
DTN's ie Delay Tolerant Networks are emerging networks that are widely used in the
communication field for implementing a more efficient protocol to use the available …