Authenticated Key Exchange (AKE) in Delay Tolerant Networks

Abstract : Key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in space environments. In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol. In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, which heavily influences the underlying security solution.
Document type :
Conference papers
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.49-60, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_5〉
Liste complète des métadonnées

Cited literature [26 references]  Display  Hide  Download

https://hal.inria.fr/hal-01518225
Contributor : Hal Ifip <>
Submitted on : Thursday, May 4, 2017 - 1:45:22 PM
Last modification on : Thursday, May 4, 2017 - 2:53:55 PM
Document(s) archivé(s) le : Saturday, August 5, 2017 - 1:09:28 PM

File

978-3-642-30436-1_5_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Sofia Menesidou, Vasilios Katos. Authenticated Key Exchange (AKE) in Delay Tolerant Networks. Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.49-60, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_5〉. 〈hal-01518225〉

Share

Metrics

Record views

29

Files downloads

30