A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI
2013
Computers & security
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. ...
In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN's. ...
DTN networks without a centralised PKI (Seth and Keshav, 2005) have employed identity based cryptography. ...
doi:10.1016/j.cose.2013.08.007
fatcat:kdyienvnyzaivb4wdd7o7vnyj4
Cryptographic Key Management in Delay Tolerant Networks: A Survey
2017
Future Internet
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making ...
Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment ...
This is based on a DTN without a centralised PKI that ensures entity authentication and utilises the LCF trust system presented in [33] . ...
doi:10.3390/fi9030026
fatcat:fmacr4hrjrd27efi677m7cja7m
SOMA: Self-Organised Mesh Authentication
[chapter]
2011
Lecture Notes in Computer Science
Our goal is to create a large-scale authentication system for mesh networks without the need of a Trusted Third Party. ...
Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics ...
This introduces a delay in the initial stages of network and can cause problems when there are insufficient trust relationships. ...
doi:10.1007/978-3-642-22633-5_3
fatcat:pzmbsou3bvelhdjbz7ijyud2bu
A First Look at Identity Management Schemes on the Blockchain
[article]
2018
arXiv
pre-print
These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge ...
Although there are no trusted third parties in the PKI-sense on Sovrin, users must rely on agencies that will act on their behalf on the Sovrin network and on the stewards maintaining the ledger. ...
However, due to the lack of a central authority, trust of these attributes currently relies upon ad-hoc trust establishment between organisations. ...
arXiv:1801.03294v1
fatcat:7ghpg3trkze5bmojenxq24pns4
Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey
2022
Sensors
The BGP plays a significant role in routing, but its behaviour is essentially naive, trusting neighbours without authenticating advertised IP prefixes. ...
The whole Internet consists of thousands of autonomous systems that transfer data with one another. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results. ...
doi:10.3390/s22041437
pmid:35214339
pmcid:PMC8876475
fatcat:pm5wd3iuprdoxbillm5olvrz2m
Blockchain challenges and opportunities: a survey
2018
International Journal of Web and Grid Services
in tackling the challenges. ...
Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application ...
Acknowledgement The work described in this paper was supported by the National Key ...
doi:10.1504/ijwgs.2018.095647
fatcat:tstcy73a7bajbcfutreco44hmu
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
2021
Sensors
In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. ...
In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process ...
Therefore, in specialised and autonomous sensor networks, memory usage optimization is critical [51] . ...
doi:10.3390/s21155122
fatcat:auzbla5c4rhzfdtnhmxeedyymq
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
2021
Computer Networks
If the underlying consensus protocols performance and fault tolerance is also considered, then only a small number of platforms meet the requirements of our reference IoT domain. ...
Blockchain and distributed ledger technologies have received significant interest in various areas beyond the financial sector, with profound applications in the Internet of Things (IoT), providing the ...
networks delays can cause severe consequences. ...
doi:10.1016/j.comnet.2021.108005
fatcat:35tosxqpxjawzilnxoco5u2b5q
GDPR-Compliant Personal Data Management: A Blockchain-based Solution
2019
IEEE Transactions on Information Forensics and Security
By honestly participating in the platform, a service provider can be endorsed by the blockchain network that it is fully GDPR-compliant; otherwise, any violation is immutably recorded and is easily figured ...
The platform enables data owners to impose data usage consent, ensures only designated parties can process personal data, and logs all data activities in an immutable distributed ledger using smart contract ...
This solution approach is designed under a centralised client-server mindset that imposes unsolvable challenges in complying with the new GDPR requirements and in establishing trust with clients [14] ...
doi:10.1109/tifs.2019.2948287
fatcat:f2rc4z7p7zb7vbhckwskmdy4ha
Towards 6G-enabled Internet of Vehicles: Security and Privacy
2022
IEEE Open Journal of the Communications Society
In this paper, we provide a timely deliberation of the role that promissory 6G enabling technologies such as artificial intelligence, network softwarisation, network slicing, blockchain, edge computing ...
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number ...
the ledger of a member is corrupted, it will be rejected by the majority of the members in the network, thus facilitating trust establishment among nodes [76] . ...
doi:10.1109/ojcoms.2022.3143098
fatcat:vfuwuncr3vaotly7yw7yx25xyu
The Kiss Principle In Software-Defined Networking: A Framework For Secure Communications
2017
Zenodo
Security is an increasingly fundamental requirement in Software-Defined Networking (SDN). ...
To address these challenges we propose KISS, a secure SDN control plane communications architecture that includes innovative solutions in the context of key distribution and secure channel support. ...
We believe that this is one first step towards lightweight but effective security for control plane communication, and potentially for SDN in general. ...
doi:10.5281/zenodo.1053803
fatcat:2beyvzaiwzf5toq6zvhhh5gea4
Legal Education in the Blockchain Revolution
2017
Social Science Research Network
It proposes eight scenarios for the application of the Blockchain in an education context, based on the current state of technology development and deployment. i ...
, autonomous, networked organisations. ...
The distributed ledgers contribute to trust by establishing a fact at a given point in time, which can then be trusted. ...
doi:10.2139/ssrn.2939127
fatcat:7jvxzzixazf77hpevogzuuwtn4
The Case of Diem: A Distributed Ledger Technology-based Alternative Financial Infrastructure Built by a Centralised Multisided Platform
2021
Zenodo
Under these circumstances, the chance of success of the Diem project clearly depends on the extent to which the aforementioned concerns can be dispelled and whether public trust can be established. ...
social networks governed and controlled by private entities. ...
In a PKI infrastructure, the identifier mechanism where risks associated with profiling and
registry is generally managed by a centralised correlation are minimised ...
doi:10.5281/zenodo.5833740
fatcat:dvg4xmuu2rc3lbeu5cwihhtniq
Privacy-Preserving Mechanism in Smart Home using Blockchain
2021
IEEE Access
To solve these challenges, an approach to data privacy and security in a smart home using blockchain technology is proposed in this paper. ...
The IoT, or Internet of Things has been a major talking point amongst technology enthusiasts in recent years. ...
PKI techniques based on blockchain are decentralised, which eliminates the need for a centralised access point or a trusted third-party [12] . ...
doi:10.1109/access.2021.3098795
fatcat:my4mp6pufjeftj2gbvmggker4i
Zero Trust Architecture (ZTA): A Comprehensive Survey
2022
IEEE Access
We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different ...
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. ...
The authors use average delay (AD) and packet delivery ratio (PDR) as the statistical parameters for trust calculation, as data plane attacks can affect the delay of critical packets or even target the ...
doi:10.1109/access.2022.3174679
fatcat:w7c27guoqzfdffhjnpgerlnnse
« Previous
Showing results 1 — 15 out of 109 results