The official PGP user's guide
Communications of the ACM
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
Security in service-oriented vehicular networks
IEEE Wireless Communications
Practical unconditionally secure two-channel message authentication
Designs, Codes and Cryptography
Non-interactive manual channel message authentication based on eTCR hash functions
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
An optimal non-interactive message authentication protocol
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
IEEE Transactions on Information Theory
Security in vehicular ad hoc networks
IEEE Communications Magazine
Editorial: Special issue on trusted computing and communications
Journal of Network and Computer Applications
Hi-index | 0.00 |
A delay tolerant network (DTN) is a store carry and forward network characterized by highly mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and physical obstructions. Emerging applications of DTN include rural DTN, vehicular DTN and pocket DTN. The development of DTN raises a number of security-related challenges due to inconsistent network access and unreliable end-to-end network path. One of the challenges is initial secure context establishment as it is unrealistic to assume that public key infrastructure (PKI) is always globally present and available, hence, the public key management becomes an open problem for DTN. In this paper, for the first time, we propose a dynamic virtual digraph (DVD) model for public key distribution study by extending graph theory and then present a public key distribution scheme for pocket DTN based on two-channel cryptography. By distinguishing between owners and carriers, public key exchange and authentication issues in the decentralized pocket DTN environment can be solved by a two-channel cryptography process and our simulation results have proven it.