An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
An opportunistic batch bundle authentication scheme for energy constrained DTNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Anomaly detection and mitigation for disaster area networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and for space missions. These challenges include the development of key management schemes suited for space missions as well as a characterization of the actual security requirements applying. A specific goal of this paper is therefore to elicit feedback from space mission IT specialists in order to guide the development of security mechanisms for delay tolerant networking.