Secure and Anonymous Communications Over Delay Tolerant Networks
نویسندگان
چکیده
منابع مشابه
Reliable Data Streaming over Delay Tolerant Networks
Data streaming over Delay-Tolerant Networks (DTN) is a challenging task considering jointly the specific characterisics of DTN environments, the demanding nature of streaming applications and their wide applicability. Presently, there are not any advanced mechanisms available to support this functionality and typical configurations fail to efficiently transfer data streams. In this paper, we pr...
متن کاملAnonymous, Secure and Efficient Vehicular Communications
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. Xiaoting Sun I understand that my thesis may be made electronically available to the public. Abstract Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissem...
متن کاملSecure Multi-copy Routing in Compromised Delay Tolerant Networks
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-copy, multi-copy, erasure-coding-based etc.) utilizing store-carryand-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication rang...
متن کاملA Secure Message Transaction Protocol for Delay Tolerant Networks
Delay/disruption tolerant network adopts a storecarry-and-forward mechanism, of which all the participants are assumed to cooperate with one another in message delivery, to overcome the challenges of the intermittent connection and the time-varying network topology. Unfortunately, there are always some nodes deviating from the rules in order to save their own precious resources. To address the ...
متن کاملSecure Group Communications over Combined Wired and Wireless Networks
Abstract. This paper considers the fundamental problem of key agreement among a group of parties communicating over an insecure public network. Over the years, a number of solutions to this problem have been proposed with varying degrees of complexity. However, there seems to have been no previous systematic look at the growing problem of key agreement over combined wired/wireless networks, con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2993062