Cryptographic Key Management in Delay Tolerant Networks: A Survey

@article{Menesidou2017CryptographicKM,
  title={Cryptographic Key Management in Delay Tolerant Networks: A Survey},
  author={Sofia-Anna Menesidou and Vasilios Katos and Georgios Kambourakis},
  journal={Future Internet},
  year={2017},
  volume={9},
  pages={26}
}
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management… 

Figures and Tables from this paper

A Scalable and Secure Group Key Management Method for Secure V2V Communication

TLDR
A group key management and message encryption method that is secure, lightweight, and scalable, and employs a distributed and scalable architecture that offers several advantages such as the reduction of the key management overhead and the enhancement of the security level by keeping the key sizes with large networks.

Provide Secure Communication from Malicious Attackers in Delay Tolerant Network Using TDKR

TLDR
A distributed key management scheme to verify or revoke certificates based on the evaluation of the social relationship strength by applying a trust based distributed key routing mechanism (TDKR).

A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design

TLDR
A Key Management Architecture for DTN (KMAD) is proposed to address challenges in DTN key management and also caters for seamless integration with Bundle Security Protocol (BSP).

Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

TLDR
This article aims to provide the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art coexistence architectures of IP and ICN, and emerges that most of the architectures utterly fail to provide several SP features including data and traffic fidentiality, availability and communication anonymity.

A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

TLDR
A novel Hierarchical structure for DTN having intracluster and intercluster communications and a security design to provide end-to-end security to DTN application data using lattice based cryptographic signature and encryption algorithms, secure under LWE hard problem over lattices is proposed.

An improved Spray and Wait routing protocol for Delay Tolerant Network

TLDR
A modified version of Binary SnW protocol referred as Hexago SnW is proposed, which used hexagonal series instead of binary series and gives better performance than others in term of overhead ratio, delivery ratio etc.

Current State of Multicast Routing Protocols for Disruption Tolerant Networks: Survey and Open Issues

TLDR
The current state of multicast routing protocols in DTN is outlined according to their design aspects and open issues are discussed to provide impetus for further research into the Reliable Multicast DTN (RMDTN) protocol.

Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems

  • A. ElsaadanyM. Hassan
  • Computer Science
    2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
  • 2019
TLDR
A new routing protocol is proposed that addresses the message delivery probability under constrained energy source and how the application of this protocol can improve the performance of delay tolerant networks.

Secure Key Management in Embedded Systems: A First Proposal

TLDR
This paper aims to provide initial guidelines to argue the choice of a secure key management approach, and the state-of-the-art is presented and benefits as well as limits are evaluated.

References

SHOWING 1-10 OF 70 REFERENCES

Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks

TLDR
This paper proposes a clear and illustrative security architecture for DTN with secure key management framework to distribute the cryptographic keys to the constituted nodes in a secure way to rescue the network model from any attacks.

A Survey of Key Management in Mobile Ad Hoc Networks

TLDR
This article presents a survey of the research work on key management in MANETs according to recent literature and proposes a number of key management schemes for MANET security.

Fully Distributed Public Key Management through Digital Signature Chains for Delay and Disrupt Tolerant Networks

  • Diogo de AndradeL. Albini
  • Computer Science
    2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
  • 2016
TLDR
This work introduces a new key management scheme for DTNs based on chains of digital signatures (DSC-KM - Digital Signature Chains Key Management Scheme), which is decentralized, fully distributed, and does not have a single point of failure.

Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm

TLDR
A time-evolving model is used in formal manner model the periodic and set in advance behavior patterns of space DTNs, and therefore, a system can schedule when and to whom it should send its public key.

Secure and Efficient Key Management Scheme in MANETs

TLDR
A survey of the research work on key management in MANETs according to recent publications is presented.

Secure group communications for Delay-Tolerant Networks

TLDR
This work proposes a novel solution based on previous work in secure group communications using key-graphs and in extension to work on scalable access authorization in self-organizing overlays to provide a scalable mechanism for access control and secure group Communications in Delay-Tolerant Networks.

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs

TLDR
A time-evolving topology model and two-channel cryptography are utilized to design efficient and noninteractive key exchange protocol for BP to establish a secure context to support for BSP, tolerating high delays, and unexpected loss of connectivity of space DTNs.

Hierarchical identity based cryptography for end-to-end security in DTNs

TLDR
This paper examines the issues in providing application protection in DTNs and proposes an architecture based on Hierarchical Identity Based Encryption (HIBE) that provides end-to-end security services along with the ability to have fine-grained revocation and access control while at the same time ensuring efficient key management and distribution.

An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks

TLDR
A novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures to reduce communication and computation cost.
...