Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
IEEE Transactions on Mobile Computing
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Secure, low-overhead key establishment is crucial to maintaining the high level of trust and security that are required many types of Delay Tolerant Networks. Existing schemes for key negotiation and exchange that are currently in use on the Internet often cannot scale to meet the environmental and technical constraints of many Delay Tolerant Networks. The few works presenting solutions to DTN key establishment have largely focused on targeted networking environments. This paper proposes a dynamic, and non-interactive scheme to facilitate secure communication in infrastructureless networks, supporting various levels of trust. Specifically, the solution presented in this paper provides a key management solution to opportunistic overlay networks using the Bundle Protocol.